The Pro Secure UTM series of all-in-one gateway security appliances combine best-of-breed security technologies & Stream Scanning technology to protect businesses against todays Web, email, & network threats. Malware hosted on Web pages, phishing attacks, spam, virus infected emails, hackers, denial-of-service attacks, & other threats are now all part of a regular repertoire of sophisticated blended attacks that bypass traditional firewalls with ease. Growing businesses have been the ones most seriously affected as they, unlike their enterprise counterparts, often lack the time & resources to fully harden & secure their networks from these threats. Pro Secure Unified Threat Management (UTM) appliances combine performance with comprehensive security coverage. Patent-pending Stream Scanning technology enables the use of an extensive virus & malware database while maintaining a high level of throughput & minimizing scanning-induced latency. The flexible modular software design architecture leverages Stream Scanning technology to scan files & data streams up to 5x faster than conventional methods. This architecture in turn enables the Pro Secure UTM to utilize virus & malware threat databases from Pro Secure & Sophos that are over one million signatures in size
- up to 400x more comprehensive than legacy all-in-one platforms. This architecture, combined with best-of-breed hybrid in-the-cloud Web filter & anti-spam technologies along with proven firewall & VPN functionality, form the ideal growing business gateway security solution. Given the high performance requirements of scanning latency sensitive Web traffic, incorporating enterprise-grade security software technologies onto traditional all-in-one platforms has been a very difficult task. That is why the Pro Secure UTM features Stream Scanning technology which analyses data streams as they enter the network. The Pro Secure Stream Scanning approach is many times faster than that of more traditional batchbased scanning methods where the entire file is buffered before it is scanned. Due to its nature, traditional batch-based scanning methods introduce latency to network traffic. While latency is more tolerable for email traffic, for large amounts of HTTP Web traffic, such latency often slows Web browsing to a crawl. All-in-one solutions in the past have tried to overcome the latency issue by minimizing the malware signature set, scanning only a handful of file types, or by avoiding Web traffic scanning altogether. This approach exposes an entire vector of the network to malware-based. The Pro Secure UTM will easily replace any existing firewall or router. A simple 10-step setup wizard guides you through installation & the UTM will be up & running in minutes. Administration is performed through an intuitive Web-based interface. Set granular policies & alerts, check summary statistics & graphical reports, drill down to IP address-level data, & integrate log data with standard network management tools using SNMP. Malware & IPS signature, software, & firmware updates are all handled by the UTM
- online & automatically. Please note: networking components such as switches, routers, UPS & wireless devices require that speeds & standards be consistent throughout the network to gain optimum performance. To avoid compatibility clashes or for advice, please contact us on solutions@ebuyer.com.