Safer and Secure VPN Access Our solutions feature SSL and IPsec VPN remote connectivity for Smarter, Safer, more Secure Remote access.
Secure SSL Tunnel: Easy access to encrypted application data for internal networks, remote users, mobile workforce and over a secure communication tunnel.
Single all-in-one appliance: Functions as a node on the network and provides endpoint security, host checking, compression, 4 forms of access, self-update of full Client, supports VOIP and client-side clean up.
Reduced cost and management complexity: Single device for both SSL VPN and IPSec VPN facilitates robust remote access and site-to-site VPN services and eliminates the need for additional security devices.
Reduced desktop support costs: Web-based access without preinstalled desktop software facilitates customized remote access based on user and security requirements.
A firewall is software used to maintain the security of a private network. Firewalls block unauthorized access to or from private networks and are often employed to prevent nauthorized Web users or illicit software from gaining access to private networks connected to the Internet. A firewall may be implemented using hardware, software, or a combination of both.
Gateway anti-virus helps to Monitor all traffic, blocking trojans, viruses, worms and malware before they enter the network. You can optionally integrate other third-party AV software. Anti-virus signature is automatically updated hourly
HTTP proxy allows visible or transparent control of HTTP and encrypted HTTPS browser traffic, including TOR and anonymous browsers. Group based policies can enforce differentiated rules by time, location, or membership. Advanced content filter controls black and white list websites and filters pornographic images. can control file download by Mime type or file extension. Hacked and Malware web sites are blocked from incoming requests.
Built-in Intrusion Detection (IDS) and Intrusion Prevention (IPS) block over 2500 internet attacks. Attack signatures are update automatically, and you can add customer signatures as well. Beyond known attacks, UTM-5000 constantly scans for anomalous traffic and protocol behavior, as well as preventing DOS and DDOS attacks.
SPAM control rules can be configured by Black/White list, header, file size, MIME, images, or sender/receiver. Bayesian filters and Auto Learning are also supported.
Next-generation firewalls provide a flexible networking architecture that includes support for dynamic routing, switching, and VPN connectivity, and enables you to deploy the firewall into nearly any networking environment. When configuring the Ethernet ports on your firewall, you can choose from virtual wire, Layer 2, or Layer 3 interface deployments. In addition, to allow you to integrate into a variety of network segments, you can configure different types of interfaces on different ports.
EN6200 WAN interfaces that can be configured for incoming and outgoing load balancing or quality based failover. A full routing functionality suite includes static, dynamic, and policy based routing rules.
All of the networks provide USB modems. These are typically available 'free' on most monthly data contracts, or to buy on PAYG ('Pay as You Go') packages. Modems supplied by the telcos are normally 'locked' to their respective networks. Check with your chosen network provider for their current models. The 3G/4G USB modem connects directly into a tacitine firewall and provides shared Internet connectivity
Where firewalls are placed in a group and their configuration is synchronized to prevent a single point of failure on your network. A heartbeat connection between the firewall peers ensures seamless failover in the event that a peer goes down. Setting up two firewalls in an HA pair provides redundancy and allows you to ensure business continuity.
You can create secure connections between IPSec gateways or VPN clients devices using SSL. Static IP and Dynamic IP configurations are support, and services can be configured by group policy. Multi-WAN support includes VPN failover to maximize uptime.