OVERVIEW
Unified Threat Management (UTM) is an approach to information security where a single hardware or software installation provides multiple security functions. This contrasts with the traditional method of having point solutions for each security function. UTM simplifies information-security management by providing a single management and reporting point for the security administrator rather than managing multiple products from different vendors. UTM appliances have been gaining popularity, partly because the all-in-one approach simplifies installation, configuration, and maintenance. Such a setup saves time, money and people when compared to the management of multiple security systems. Instead of having several single-function appliances, all needing individual familiarity, attention, and support, network administrators can centrally administer their security defenses from one computer.
GOALS
Firewall and Router
- Stateful Packet Inspection (SPI)
- Anti-Spoofing
- Time-based rules
- Connection limits
- NAT mapping (inbound/outbound)
- VLAN support (802.1q)
- DHCP server
Proxy and Content Filtering
- HTTP and HTTPS proxy
- Non Transparent or Transparent caching proxy
- Domain/URL filtering
- Anti-virus filtering
- SafeSearch for search engines
- HTTPS URL and content screening
- Website access reporting
- Domain Name blacklisting (DNSBL)
VPN
- The site-to-site and remote access VPN support
- SSL encryption
- VPN client for multiple operating systems
- Multi-WAN for failover
- NAT support
Enterprise Reliability
- Optional multi-node High Availability Clustering
- Multi-WAN load balancing
Total Cost of Ownership
- No artificial limits or add-ons required to make your system fully functional.
- No additional usage or feature-based pricing. Enjoy unlimited users, unlimited firewall rules, unlimited IPsec tunnels, dual WAN, etc.
- Standard configuration with 16GB of RAM.
- Low power requirements to help save you money.
- This system is designed for a long deployment lifetime.
- From the firewall to Unified Threat Management, get all the security features you need to protect your home or business.
- Flexible configuration and support for multi-WAN, high availability, VPN, load balancing, reporting, and monitoring, etc.
- Maximum Active Connections: 16,000,000 (16,000,000 with 16 GB RAM)