Unified Threat Management (UTM) provides multiple security features and services in a single device on the network, protecting users from security threats in a simplified way. UTM includes functions such as Firewall, Antivirus, Antispam, Intrusion Prevention/Detection, Web-Application Control, Sandboxing, Link Load Balance, Bandwidth Management, Client Authentication, VPN and Detailed Reporting.
Gateway Antivirus: The Cloud Gateway Anti-Virus feature introduces an advanced malware scanning solution that compliments and extends the existing Gateway AV scanning mechanisms present on firewalls to counter the continued growth in the number of malware samples in the wild.
Intrusion Prevention / Detection: Enables protection for a wide variety of attacks, such as SQL injection, cross-site scripting, remote code execution, shell code payloads and remote procedure calls.
Web-Application Control: Web-Content Filtering Service blocks inappropriate, unproductive and even illegal and malicious web content for UTM customers around the globe as per individual requirements.
- As a set of application-specific policies, Application Control gives you granular control over network traffic on the level of users, email addresses, schedules, and IP-subnets. The primary functionality of this application-layer access control feature is to regulate Web browsing, file transfer, email, and email attachments.
VPN: A virtual private network, also known as a VPN, is a private network that extends across a public network or internet. It enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
Types of VPN available in UTM:
Reporting: Provides real-time event monitoring, user activities, bandwidth consumption, application identifications, flow analytics and forensics, compliance and audit reporting, scheduled reports, and more.