member sign-in
Forgot password? Create new account Close

UTM (Multifunction Firewall)

 

Definition

UTM multifunctional Firewall is a complete office network-in-a-box Internet security appliance for small and medium-size businesses (SMBs). This appliance combines security features into one appliance: network firewall, network intrusion prevention,VPN, Antivirus, Antispam and URL filtering and are dedicated to gateway.

 

User benefits

UTM multifunctional firewalls are  used to prevent unauthorized users from accessing private networks connected to the Internet, especially intranets and all messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.

 

UTM Multifunctional  Firewall are used  to easily set up business office with:

  • A local network of office PCs (wired or wireless)
  • Secure connectivity to the Internet with web-based content filtering
  • Seamless LAN to WAN connectivity with secure remote VPN access for your branch offices and mobile staff
  • A complete perimeter security solution, with options such as firewall, VPN, IDS/IPS, anti-spam, and content filtering

 

 

Business impact

Using a UTM multifunctional firewall into the network  gives advantages like:

- Integrated solution from the same vendor which provides full features’ compliance

- Ease   to manage the appliance

- Single point of contact – acces to vendor’s  support by phone or email

- Reduced technical training requirements , one product to learn

 

 

 

Into the network,  the UTM multifunctional firewall can be managed individually or can be  centrally managed and this  is critical to larger distributed environments because it allows network administrators to manage hundreds or even thousands of UTM multifunctional firewall appliances for  upgrades, policy changes, and other configuration tasks.

The strength of UTM multifunctional firewall  is that it is designed to offer comprehensive security while keeping security an easy-to-manage affair.


Products supporting this technology

Kerio

Protecting networks against today’s constantly evolving threat environment has never been more challenging. Infrastructure, connectivity and performance requirements keep growing. New and varied threats are leading to more security vendors, pointproducts and complexity, while IT teams are under increasing pressure to reduce costs and complexity, and do more with existing hardware and resources. The combination of these challenges has lead to ineffective approaches that are increasingly inefficient, costly and unsustainable.

As a result, organizations and IT teams are looking for an effective solution—one that is more simple, flexible and easier to manage. This includes the freedom to add critical protection as needed, without worrying about performance and  availability. It also means the ability to invest in security only as you need it, without having to introduce yet another security vendor and point appliance.

As a result, many firewall’s vendors started to look to a new direction by adding into their portofolio new software unified threat management.

This new vision of software architecture is a  total, flexible and manageable security to companies of any size because it enables them to easily and efficiently tailor their network security infrastructure to meet critical and targeted business security needs. Depending on the company’s size and number of unfied threat management, solutions can be  centrally managed through a single console that reduces complexity and operational,  faster return on investment (ROI) and cost-efficient protection to meet any network security need—today and in the future.The software firewall can be deployed on open servers and the all functionalities throughput depends on the installed server’s processor’s type, storage, network interfaces and memory.

Looking closer to the avantages of using software firewalls, it can be names the easy management, flexibility and  security integration to allow the right level of security at all layers of the network.

  • manufacturer
  • xDSL Connectivity
  • 3G Connectivity
  • WiFi Connectivity
  • IPS
  • Firewall throughput range
  • VPN throughput range
  • Interfaces range