OVERVIEW

Unified Threat Management (UTM) is an approach to information security where a single hardware or software installation provides multiple security functions. This contrasts with the traditional method of having point solutions for each security function. UTM simplifies information-security management by providing a single management and reporting point for the security administrator rather than managing multiple products from different vendors. UTM appliances have been gaining popularity, partly because the all-in-one approach simplifies installation, configuration, and maintenance. Such a setup saves time, money and people when compared to the management of multiple security systems. Instead of having several single-function appliances, all needing individual familiarity, attention, and support, network administrators can centrally administer their security defenses from one computer.

GOALS

Firewall and Router

  • Stateful Packet Inspection (SPI)
  • Anti-Spoofing
  • Time-based rules
  • Connection limits
  • NAT mapping (inbound/outbound)
  • VLAN support (802.1q)
  • DHCP server

Proxy and Content Filtering

  • HTTP and HTTPS proxy
  • Non Transparent or Transparent caching proxy
  • Domain/URL filtering
  • Anti-virus filtering
  • SafeSearch for search engines
  • HTTPS URL and content screening
  • Website access reporting
  • Domain Name blacklisting (DNSBL)

VPN

  • The site-to-site and remote access VPN support
  • SSL encryption
  • VPN client for multiple operating systems
  • Multi-WAN for failover
  • NAT support

Enterprise Reliability

  • Optional multi-node High Availability Clustering
  • Multi-WAN load balancing

Total Cost of Ownership

  • No artificial limits or add-ons required to make your system fully functional.
  • No additional usage or feature-based pricing. Enjoy unlimited users, unlimited firewall rules, unlimited IPsec tunnels, dual WAN, etc.
  • Standard configuration with 16GB of RAM.
  • Low power requirements to help save you money.
  • This system is designed for a long deployment lifetime.
  • From the firewall to Unified Threat Management, get all the security features you need to protect your home or business.
  • Flexible configuration and support for multi-WAN, high availability, VPN, load balancing, reporting, and monitoring, etc.
  • Maximum Active Connections: 16,000,000 (16,000,000 with 16 GB RAM)