Perimeter Defense - UTM67

Select Up to 5 Products to Compare

  • Product Info
  • Resources
  • Awards
  • Certifications & Compliance
Product Vendor   Description License
SC Magazine (US) Gartner White Papers Mosaic Montage Mosaic Shortlist Tool Awards CC FIPS ICSA Labs OPSWAT Silver OPSWAT Bronze
AccessEnforcer Calyptix Security Corporation   AccessEnforcer is so much more than just a firewall. Sure, AccessEnforcer provides firewall functions. But it is much more than that. Powerful spam filter: AccessEnforcer provides a powerful quarantine-based anti-spam filter straight out of the box. That means you don't need a separate spam filter for your organization. This enables you to save cost, and eliminate the need to manage multiple systems. A web filter that integrates with Active Directory: AccessEnforcer's web filter integrates with Microsoft's Active Directory. If you have a Windows Server, you can get reports of user web activity with their names, not IP addresses. Reliable automatic updates: When was the last time you updated your firewall's firmware? AccessEnforcer's firmware is automatically updated. When new releases are available, your AccessEnforcer unit will automatically download the new release and install it. In virtually all cases, no reboots are required and your users do not notice any difference -- except improvements! PDF reports without additional software/hardware: Get boss-ready PDF reports right out of the box! No additional software and hardware required. Military-grade security: Each AccessEnforcer unit is preloaded with Snort, the intrusion detection and prevention engine used by the US Department of Defense and other enterprises. Snort uses techniques beyond the firewall to actively stop worms, spyware, and malware from entering your network. Extremely secure foundation: Just like you won't buy a house that is built on a foundation of sand, your firewall should not run on an insecure foundation. AccessEnforcer runs on OpenBSD, the renowned operating system that has only two security holes in its default install state in more than ten years. All these powerful features that are not part of any regular firewall are provided to you at no extra cost. And they are just the tip of the iceberg. AccessEnforcer is so much more than just a firewall. Sure, AccessEnforcer provides firewall functions. But it is much more than that. Powerful spam... Commercial                    
All-n-One Security Module Global DataGuard   The ASM enables sharing of information between security applications and appliances, greatly reducing IT complexity and providing all security applications with superior performance, operational ease, and a significant reduction in TCO. The All-n-One Security Module (ASM) from Global DataGuard is specifically designed for small to medium enterprises. The ASM defines a new category of security product–Enterprise Unified Threat Management (Enterprise UTM). The ASM consolidates the myriad of network security appliances, expands network security coverage, and provides a truly integrated network security suite. The ASM enables sharing of information between security applications and appliances, greatly reducing IT complexity and providing all security... Commercial           2011 Finalist for Virtualization Best Product Award
Network Products Guide
Finalist for Global Product Excellence Awards -- Compliance
Info Security Products Guide
2010  Best in Virtual Network Security
Network Products Guide
         
Ally IP Arxceo   Arxceo’s patented technologies, PnPro™ and Tag-UR-IT™, significantly enhance network protection in today’s environment. All Arxceo appliances implement these technologies to provide the most robust anti-reconnaissance technology in the industry -- providing anomaly-based attack prevention while stopping attackers and worms from probing your network. Plug and Protect™ (PnPro) - No TCP/IP or MAC address; cannot be targeted or exploited - Provides quick deployment; fifteen minute installation - No client impact; no configuration changes to any other devices - 100% compatible with other network hardware and software Tagged Universal Resource Information Transmission™ (Tag-UR-IT) - Anomaly and behavior based detection; no signatures needed - Tags, inspects and pre-processes packets before forwarding onward; hardens network traffic before it enters your network - Provides protocol enforcement, anti-spoofing protection, and anti-reconnaissance - Stops Denial of Service attacks (DoS, DDoS, DRDoS, etc.) along with "slow and low" network recons -- even preventing bouncescans from succeeding. Arxceo’s patented technologies, PnPro™ and Tag-UR-IT™, significantly enhance network protection in today’s environment. All Arxceo appliances implement... Commercial Read Review                  
AppGate Security Server Secured eMail Limited   A better way to build secure networks. Traditionally, securing networks involved building a ‘wall’ around the edge of the network. Everything on the outside was treated as a threat and everything on the inside as benign. However, organisations have changed. Users on the inside need access to outside resources on the Internet, and many users and services on the outside need access to internal resources, for example remote users and IP telephony services. The firewall-centric approach is no longer appropriate. How do you provide access to those who need it while also ensuring resources are fully protected? The AppGate Security Server solves this challenge by using a different approach to security: protecting the IT assets, not the network perimeter. All users are treated the same regardless of their location, and access to individual systems is granted to authorized users on a needs-only basis. The result is secure access control, a simpler network infrastructure, and much greater flexibility since it is as easy to share network resources with business partners, home workers and mobile users as it is for internal users. The Security Server replaces multiple point products with one appliance which is easier to manage and cheaper to run * Strong security protects against internal and external threats * Internal secure domains protect critical data without the need for internal firewalls * Remote access from any device, any location * Central control of security policies and user administration * Business continuity and high availability through clustering * Full monitoring and reporting of all user access for regulatory compliance A better way to build secure networks. Traditionally, securing networks involved building a ‘wall’ around the edge of the network. Everything on the... Commercial                    
Arkoon+Netasq Multi-function Firewall Arkoon+Netasq   Netasq has developed a comprehensive range of network security solutions. Combining multiple layers of protection without compromising on performance, Netasq firewalls address the security needs of companies of all sizes. SMBs The latest models of Netasq application firewalls embed all the protection technologies usually reserved for large corporations and military organizations. Large corporations The NG1000-A and NG5000-A appliances are designed to adapt to the high-bandwidth, mission-critical environments of large corporations. They can be used to secure broadband internet access, or as analysis and traffic protection probes. Netasq has developed a comprehensive range of network security solutions. Combining multiple layers of protection without compromising on performance,... Commercial Read Review Read Review                
Astaro RED Sophos, Inc.   Astaro RED (Remote Ethernet Device) is the easiest and most affordable way to secure your branch offices. You can centrally configure it via an Astaro Security Gateway located at your headquarter which automatically distributes the configuration to the Astaro RED appliance. By forwarding all traffic to the central Astaro Security Gateway, Astaro RED provides complete UTM security even for your smallest remote or home office. In contrast to standard security appliances Astaro RED not only provides stronger security but also slashes the total cost of ownership by 80% as there's no need for technical skill or ongoing maintenance at the remote site. Astaro RED (Remote Ethernet Device) is the easiest and most affordable way to secure your branch offices. You can centrally configure it via an Astaro... Commercial Read Review Read Review Read Review     2011 Finalist for Best Support Team of the Year
Network Products Guide
2011 Finalist for Best Support Initiative or Program of the Year
Network Products Guide
Finalist for Global Product Excellence Awards -- Access
Info Security Products Guide
         
Astaro Security Gateway Hardware Appliances Sophos, Inc.   Our hardware appliances are purpose built, high-performance security devices. They integrate Astaro's security applications with a hardened Operating System on optimized Intel-compatible server systems that cater to every business size. Astaro Network Security Astaro Network Security includes fully integrated features such as a configurable firewall paired with an Intrusion Protection system, Denial of Service, lots of traffic forwarding and NAT tools and much more. Take a deeper look at the extensive range of features provided by this security application. Astaro Mail Security Astaro Mail Security ensures that the abuse which email is subjected to, such as spam, viruses and privacy issues, do not affect your daily business routines. Through this application, real messages are properly delivered and employees can find what they need without being exposed to damaging content. Take a deeper look at the extensive range of features provided by this security application. Astaro Web Security Astaro Web Security protects employees from threats and allows you to apply terms and conditions to where and how they can spend their time online. Spyware and viruses are stopped before they can enter the network and cause damage. Everything is tracked and arranged in detailed reports which show how effective your policy is so adjustments can be made. Astaro Web Application Security Astaro Web Application Security hardens your web servers using Reverse Proxy technology to protect them from modern attacks and data loss. With it, you can securely offer applications like Outlook Web Access (OWA) and guard against techniques like SQL Injection and Cross Site Scripting (XSS). Stop hackers from using these types of attacks to gain access to sensitive information like credit card data, personal information, and social security numbers. Astaro Web Application Security aids you in compliance efforts where a web application firewall is required, such as PCI-DSS. Astaro Wireless Security Although every organization would benefit from wireless networking, existing solutions either lack important functionality or are too expensive and difficult to manage. Astaro Wireless Security is a new approach that dramatically simplifies the operation of secure and reliable wireless networks. With Astaro Security Gateway's built-in wireless controller, our access points are cost-effective and require no manual configuration, redefining wireless networking for small and medium businesses Our hardware appliances are purpose built, high-performance security devices. They integrate Astaro's security applications with a hardened Operating... Commercial Read Review   Read Review     2011 Finalist for Best Support Team of the Year
Network Products Guide
2011 Finalist for Best Support Initiative or Program of the Year
Network Products Guide
Winner of Global Product Excellence Awards -- Integrated Security/ Unified Threat Management (UTM)
Info Security Products Guide
         
Astaro Security Gateway Software Appliance Sophos, Inc.   Our software appliances include the operating system and all security applications bundled within a single software image. While offering the same capabilities as the hardware platform, they can be easily installed on your hardware of choice - maximizing deployment flexibility. The Astaro Security Gateway software appliances are much easier and faster to set-up than software applications that require the installation of an operating system in advance. Astaro Network Security Astaro Network Security includes fully integrated features such as a configurable firewall paired with an Intrusion Protection system, Denial of Service, lots of traffic forwarding and NAT tools and much more. Take a deeper look at the extensive range of features provided by this security application. Astaro Mail Security Astaro Mail Security ensures that the abuse which email is subjected to, such as spam, viruses and privacy issues, do not affect your daily business routines. Through this application, real messages are properly delivered and employees can find what they need without being exposed to damaging content. Take a deeper look at the extensive range of features provided by this security application. Astaro Web Security Astaro Web Security protects employees from threats and allows you to apply terms and conditions to where and how they can spend their time online. Spyware and viruses are stopped before they can enter the network and cause damage. Everything is tracked and arranged in detailed reports which show how effective your policy is so adjustments can be made. Astaro Web Application Security Astaro Web Application Security hardens your web servers using Reverse Proxy technology to protect them from modern attacks and data loss. With it, you can securely offer applications like Outlook Web Access (OWA) and guard against techniques like SQL Injection and Cross Site Scripting (XSS). Stop hackers from using these types of attacks to gain access to sensitive information like credit card data, personal information, and social security numbers. Astaro Web Application Security aids you in compliance efforts where a web application firewall is required, such as PCI-DSS. Our software appliances include the operating system and all security applications bundled within a single software image. While offering the same... Commercial Read Review   Read Review     2011 Finalist for Best Support Team of the Year
Network Products Guide
2011 Finalist for Best Support Initiative or Program of the Year
Network Products Guide
Winner of Global Product Excellence Awards -- Integrated Security/ Unified Threat Management (UTM)
Info Security Products Guide
         
Astaro Security Gateway Virtual Appliance for VMware Sophos, Inc.   Our virtual appliances include a software appliance which has already been pre-installed and pre-configured for VMware environments. Being the first unified threat management product that has been certified as "VMware Ready", it allows for the secure and easy deployment of an "all-in-one" security solution within a virtual environment. This section details the security applications available, technical information and deployment scenarios. Our virtual appliances include a software appliance which has already been pre-installed and pre-configured for VMware environments. Being the first... Commercial Read Review Read Review Read Review     2011 Finalist for Best Support Initiative or Program of the Year
Network Products Guide
2011 Finalist for Security Software (New or Upgrade version) Best Product Award
Network Products Guide
2011 Finalist for Best Support Team of the Year
Network Products Guide
         
Barrier1 Security Appliances Barrier Group   Buy What You Need. The hardware comes in six different sizes, and the size that best fits your needs can be determined in the pre-sales phase. You pay a one-time charge to purchase the hardware, which includes installation and a one-year warranty, 24×7 management, monitoring and updating, as well as technical support. You also decide which security technologies your organization needs. Barrier1 hosts a vast array of on-board security technologies, although you may not need them all. Simply order different sections through an annual subscription. Options include the following: Section #1: Firewall Stateful firewall, application firewall (models 50 – 300), multiple DMZs, traffic shaping Section #2: Antispam / Antivirus Antispam protection, antivirus protection, e-mail filtering, e-mail forwarding with masking Section #3: IDS / IDP Intrusion detection, intrusion prevention, honey pot, anomaly detection, application awareness Section #4: Web Content Web content filter, cache server, proxy server, web forwarding Section #5: SSL VPN 3sp product SSL-Explorer Section #6: Advanced Reporting Barrier1 advanced reporting / compliance reporting module Buy What You Need. The hardware comes in six different sizes, and the size that best fits your needs can be determined in the pre-sales phase. You pay a... Commercial           2008  Best in Intelligent Threat Management
Network Products Guide
         
BIG-IP Product Family F5 Networks   One device. Complete control. Applications running across networks can cause a wide variety of problems. Whatever the problem, though, the BIG-IP Product Family can handle it. BIG-IP is the only device in the industry that can do everything. It delivers high availability, improved performance, application security, and access control, all in one unit. A single BIG-IP device can do the work of a dozen single-purpose products. More importantly, it can do that work in an efficient, cohesive manner that is easier to manage and adapt as business and technology needs change. The BIG-IP Product Family is also extraordinarily flexible and configurable. You choose which functions you want by selecting various BIG-IP product modules and BIG-IP feature modules. Depending on which modules and how much traffic capacity you need, you can choose from various BIG-IP hardware platforms. One device. Complete control. Applications running across networks can cause a wide variety of problems. Whatever the problem, though, the BIG-IP... Commercial     Read Review     2011 SC Awards U.S. Finalists - Best Web Application Firewall
SC Magazine
2011 SC Awards U.S. Finalists - Best IPsec/SSL VPN
SC Magazine
Best web application security solution
SC Magazine
         
BroadWeb NetKeeper series BroadWeb Corporation   BroadWeb Corp. was founded in 1999, by a group of National Tsing-Hua University’s networking experts led by Prof. Nen-Fu Huang, the chairman of Computer Science department. The convenience of the Internet has created a tremendous worldwide venue for commerce and information sharing. Unfortunately, this same convenience creates tremendous network security problems. In the past, the industry used firewalls as the main tool to ward off intrusions by hackers. But as network attack patterns become more varied and complicated, a simple firewall fails to meet the security requirements of the modern commercial network environment. BroadWeb's NetKeeper series, an Gigabit-level Multi-port Intrusion and Prevention Systems (IPS), is the most recent innovation in the invasion detection arms race. It not only detects intrusion accurately but real-time blocks malicious packets before their entries. BroadWeb Corp. was founded in 1999, by a group of National Tsing-Hua University’s networking experts led by Prof. Nen-Fu Huang, the chairman of... Commercial                    
Celestix MSA - Threat Management Gateway Series Celestix Networks Inc   The world’s most deployed platform for Microsoft’s Forefront Threat Management Gateway (TMG) 2010 Celestix is committed to continue servicing the market for Microsoft TMG 2010 until 2023, enabling businesses to continue deploying this market leading perimeter security platform.Celestix MSA™ security appliances deliver Microsoft’s Forefront Threat Management Gateway 2010 for unmatched multi-threat protection with industry-leading ease of use and value. Performance, reliability, and ease of management backed by expert Celestix customer support have made MSA the world’s best-selling Microsoft security appliances. Microsoft’s Forefront Threat Management Gateway 2010 (TMG) puts fortified layers of best-in-class security functions throughout your network to block, detect, and thwart attacks from beyond the edge, at the edge, and inside your network. MSA appliance range is the world’s most deployed platform for Microsoft TMG 2010. MSA appliances are built for rapid deployment, simplified management and high performance. The COMET software engine provides an intuitive and feature rich web UI that allows for advanced configuration for both TMG and the appliance. Celestix provides numerous additional features that complement and enhance the use of TMG. Automated update services provide pre-screened alerts and patches through the web UI, and multiple back-up and restore options provide solutions for disaster recovery. The world’s most deployed platform for Microsoft’s Forefront Threat Management Gateway (TMG) 2010 Celestix is committed to continue servicing the... Commercial                    
Check Point Next Generation Firewalls and UTMs Check Point Software Technologies Ltd.   Check Point invented the stateful packet inspection technology that is utilized by virtually all firewalls today. A long-time leader in Gartner’s Enterprise Network Firewalls Magic Quadrant, Check Point is recognized by the leading analyst firm for its strong technology leadership and vision, and has won multiple awards from other analyst firms over the years. The Check Point Firewall Software Blade incorporates all of the power and capability of the revolutionary FireWall-1 solution while adding user identity awareness to provide granular event awareness and policy enforcement. Check Point Security Appliances are integrated hardware devices that are pre-installed with essential software blades to produce a comprehensive, turnkey security gateway solution. The Check Point Firewall Software Blade builds on the award-winning technology first offered in Check Point’s FireWall-1 solution to provide the industry’s strongest level of gateway security and identity awareness. Check Point’s firewalls are trusted by 100% of the Fortune 100 and deployed by over 170,000 customers, and have demonstrated industry leadership and continued innovation since the introduction of FireWall-1 in 1994. Check Point invented the stateful packet inspection technology that is utilized by virtually all firewalls today. A long-time leader in Gartner’s... Commercial Read Review         2011 SC Awards U.S. Finalists - Best Endpoint/UTM Security
SC Magazine
SANS WhatWorks - 2.4 Firewalls, Enterprise Antivirus and Unified Threat Management
SANS
         
Cisco ASA Content Security and Control (CSC) Security Services Module Cisco Systems Inc   The Cisco ASA 5500 Series Content Security and Control Security Services Module (CSC-SSM) delivers industry-leading threat protection and content control at the Internet edge providing comprehensive antivirus, anti-spyware, file blocking, anti-spam, anti-phishing, URL blocking and filtering, and content filtering-all available in a comprehensive easy-to-manage solution delivered by industry leaders. The CSC-SSM bolsters the Cisco ASA 5500 Series' strong security capabilities providing customers with additional protection and control over the content of their business communications. The service module provides additional flexibility and choice over the functionality and deployment of Cisco's award-winning Cisco ASA 5500 Series Family of appliances. The Cisco ASA 5500 Series CSC-SSM helps businesses more effectively protect their networks, increase network availability, and increase employee productivity through the following elements: Comprehensive malware protection Advanced content filtering Integrated message security Integrated message security Customization and tuning capabilities Ease of management and automatic update capabilities The Cisco ASA 5500 Series Content Security and Control Security Services Module (CSC-SSM) delivers industry-leading threat protection and content... Commercial   Read Review Read Review     SANS WhatWorks - 2.4 Firewalls, Enterprise Antivirus and Unified Threat Management
SANS
         
Cisco ProtectLink Security Solutions (Small Business) Cisco Systems Inc   Your network security is in good hands with ProtectLink products. These security products work together with selected Cisco routers and security appliances so you don't need any additional hardware, and ProtectLink products are easy to deploy and manage across your network. Each ProtectLink product addresses a specific security threat and as part of an overall security approach provides layers of protection against different threats. Your network security is in good hands with ProtectLink products. These security products work together with selected Cisco routers and security... Commercial     Read Review              
Cisco SA 500 Series Security Appliances (Small Business) Cisco Systems Inc   These all-in-one security solutions are designed for businesses with fewer than 100 employees. They combine firewall, VPN, and optional intrusion prevention system (IPS), email, and web security capabilities. Whether in the office or working remotely, your employees can securely access the resources they need, while your business is protected from unauthorized access and Internet threats. All-in-one device: Combines firewall, IPS, email and web security, and secure access in one box Secure wireless and remote access: Easily allow mobile workers and branch offices remote, secure access with flexible and easy to use built-in VPNs Low overhead: Reduce costs associated with deployment and ongoing management and monitoring of the security solution Affordable service coverage: Deliver service value and peace of mind at a price you can afford Optional email and web security capabilities: Cisco ProtectLink Gateway: Cloud-based service that provides strong, automatically updated email and web security VeriSign Identity Protection (VIP): An easy and effective second level of authentication Intrusion prevention system (IPS): Identify and take action to stop possible intrusions into the business network Peer-to-peer, IM traffic blocking and protocol inspection to help increase network security, employee productivity, and network availability for business traffic These all-in-one security solutions are designed for businesses with fewer than 100 employees. They combine firewall, VPN, and optional intrusion... Commercial   Read Review Read Review              
Cisco Small Business Pro SA 500 Series Security Appliances Cisco Systems Inc   Cisco SA 500 Series Security Appliances are designed for businesses with fewer than 100 employees. They combine firewall, VPN, and optional intrusion prevention system (IPS), email, and web security capabilities. Whether in the office or working remotely, your employees can securely access the resources they need, while your business is protected from unauthorized access and Internet threats. Optional email and web security capabilities provide an additional layer of security. Cisco ProtectLink Gateway is a cloud-based service that provides strong, automatically updated email and web security to help block spam, viruses, spyware, phishing, and inappropriate web browsing. To prevent hackers, worms, and other threats, and provide protocol inspection and the ability to block instant messaging and peer-to-peer traffic, the optional VeriSign Identity Protection (VIP) service provides a second level of authentication before granting remote network access. Affordable Small Business Pro Service coverage gives you peace of mind in knowing that your Cisco Small Business Pro solutions are delivering the highest level of performance and reliability to keep your most important business processes running smoothly. Cisco SA 500 Series Security Appliances are designed for businesses with fewer than 100 employees. They combine firewall, VPN, and optional intrusion... Commercial   Read Review Read Review     SANS WhatWorks - 2.4 Firewalls, Enterprise Antivirus and Unified Threat Management
SANS
         
Cyberoam Central Console (CCC) Cyberoam   Cyberoam Central Console (CCC) with its centralized management and control offers coordinated defense against zero-hour and blended threats across distributed networks. It enables enterprise-wide implementation of corporate Internet policy, ensuring high productivity and security. Being an appliance-based solution, CCC lowers the cost of deployment while offering comprehensive control over distributed networks to large enterprises and Managed Security Service Providers (MSSPs). Cyberoam Central Console (CCC) with its centralized management and control offers coordinated defense against zero-hour and blended threats across... Commercial Read Review Read Review Read Review     2008 Hot Companies
Network Products Guide
         
Cyberoam Network Security Appliance Cyberoam   For large enterprises with distributed networks, implementing a secure, reliable and centrally managed network is critical to ensure high levels of security at the central and remote offices. Deployment of a range of individual security solutions brings in issues of management and control of the solutions, particularly at the time of security incident, delaying response. In addition, with insider threats accounting for 50 % of threats, identifying the user becomes critical to security. Cyberoam CR500ia, CR750ia, CR1000i and CR1500i are powerful identity-based network security appliances that deliver comprehensive protection to large enterprises from blended threats that include malware, virus, spam, phishing, and pharming attacks. Cyberoam's unique identity-based Network Security Appliance protects large enterprise users from internal threats that lead to data theft and loss too. For large enterprises with distributed networks, implementing a secure, reliable and centrally managed network is critical to ensure high levels of... Commercial Read Review Read Review Read Review     2008 Hot Companies
Network Products Guide
2008  Best in URL Filtering
Network Products Guide
         
Damballa Failsafe Damballa   The only constant across the millions of variants of malware, crimeware, and bot agents penetrating enterprise defenses today is the command-and-control (CnC) communications used to issue instructions and exfiltrate information from a compromised endpoint. Damballa Failsafe rapidly identifies CnC behaviors and communications to and from breached assets and profiles the risk of each compromise. By employing multi-dimensional inspection engines, correlated intelligence, and a global threat reputation system, Damballa Failsafe accurately detects known and zero-day threats and mitigates the risk caused by these breaches by blocking the CnC communication from bot malware installed on compromised assets to criminal CnC servers. The only constant across the millions of variants of malware, crimeware, and bot agents penetrating enterprise defenses today is the command-and-control... Commercial                    

Loading...