UTM & Next-Generation Firewall

The Ultimate Security Package

Essential next-gen firewall protection for your network, web, email, applications, and users.

         
Features     Compare Models     Add-ons

 Network Protection

All the protection you need to stop sophisticated attacks and advanced threats while providing secure network access to those you trust.


How it Works

  
Features
  • Network Firewall
  • Intrusion Prevention System
  • Advanced Threat Protection
  • Secure VPN Access
  • Site-to-Site VPN
  • Self Service User Portal

 Wireless Protection

Set up, manage and secure wireless networks in just minutes with the UTM’s built-in wireless controller that works with our full range of wireless access points.


How it Works

  
Features
  • Plug & Play Deployment
  • Multiple WiFi Zones
  • Reliable High-Speed Wireless
  • Mobile NAC
  • Guest WiFi Hotspots
  • Secure Encryption

 Web Protection

Comprehensive protection from the latest web threats and powerful policy tools ensures your users are secure and productive online.


How it Works

  
Features
  • Web Malware Protection
  • URL Filtering Policies
  • URL Filtering Policies
  • HTTPS Scanning
  • Layer-7 Application Control
  • Web in Endpoint

 Endpoint Protection

Extend protection to your Windows desktops and laptops with anti-virus, device, and web control all managed from your UTM.


How it Works

  
Features
  • Single console management
  • Easy Deployment
  • Anti-Virus and Malware Protection
  • Device Control
  • Web in Endpoint

 Email Protection

Full SMTP and POP message protection from spam, phishing and data loss with our unique all-in-one protection that combines policy-based email encryption with DLP and anti-spam.


How it Works

      
Features
  • SPX Email Encryption
  • Standards-based Encryption
  • Data Loss Prevention
  • Live Anti-Spam
  • Self-Serve Quarantine
  • Outlook Add-in

 Web Server Protection

Harden your web servers and Microsoft Enterprise Applications against hacking attempts while providing secure access to external users with reverse proxy authentication.


How it Works

      
Features
  • Web Application Firewall
  • Server Hardening
  • Reverse Proxy Authentication
  • Anti-virus Scanning
  • SSL Offloading