Future-ready security for small and mid-size enterprises

Similar documents
Seqrite TERMINATOR (UTM) Unified Threat Management Solution.

Angelo Gentili Head of Business Development, EMEA Region, PartnerNET

SteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS)

NetDefend Firewall UTM Services

Training UNIFIED SECURITY. Signature based packet analysis

Security for the Cloud Era

Security Assessment Checklist

Symantec Client Security. Integrated protection for network and remote clients.

The Eight Components of a Strong Cyber Security Defense System

Seqrite Endpoint Security

USG310/210/110. Benefits. Always online. Protection and optimization. Next Generation Firewall (NGFW) for small and medium-sized businesses

All-in one security for large and medium-sized businesses.

UTM Firewall Registration & Activation Manual DFL-260/ 860. Ver 1.00 Network Security Solution

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS NETWORK SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim

Kerio Control. Unified Threat Management without Complexity. Presenters name. Presented by

Check Point softwareblades Secure. Flexible. Simple

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

Business Strategy Theatre

Security with Passion. Endian UTM Virtual Appliance

Copyright Huawei Technologies Co., Ltd All rights reserved. Trademark Notice General Disclaimer

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

Cisco s Appliance-based Content Security: IronPort and Web Security

Cisco ASA 5500 Series IPS Edition for the Enterprise

Introducing the CSC SSM

Medium / Large Enterprises Next-Generation UTM NU-850C

Cyberoam. Unified Threat Management. Comprehensive Network Security

NETWORK SECURITY STORMSHIELD. Unified Threat Management Solutions and Next- Generation Firewalls

Product SuperMassive 9200 SuperMassive 9400 SuperMassive 9600 Part Numbers

AlliedWare Plus UTM FIREWALL OVERVIEW

A Unified Threat Defense: The Need for Security Convergence

Seqrite Antivirus for Server

Cisco Self Defending Network

Medium / Large Enterprises Next-Generation UTM NU-850C

2 ZyWALL UTM Application Note

Cisco SR 520-T1 Secure Router

KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Security Quick Sales Guide

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

The SonicWALL PRO Series

NetDefend UTM Firewall Series

Symantec Protection Suite Add-On for Hosted Security

Product NSA E5500 NSA E6500 NSA E8500 NSA E8510 Part Numbers. 01-SSC SSC-7028 TotalSecure

Changing face of endpoint security

Exam: : VPN/Security. Ver :

PineApp Mail Secure SOLUTION OVERVIEW. David Feldman, CEO

Quick Sales Guide. Security

Cisco ASA 5500 Series IPS Solution

Cisco SA 500 Series Security Appliances

PCI DSS Compliance. White Paper Parallels Remote Application Server

Chapter 1 B: Exploring the Network

SONICWALL SECURITY HEALTH CHECK PSO 2017

UTM 5000 WannaCry Technote

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ

CA Security Management

CA Host-Based Intrusion Prevention System r8

SONICWALL SECURITY HEALTH CHECK SERVICE

Surat Smart City Development Ltd. Surat Municipal Corporation 1

A Comprehensive CyberSecurity Policy

Synchronized Security

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems

Chapter 9. Firewalls

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

Deployment of security devices can result in significant financial savings from reduction or redirection of IT staff resources needed to deploy,

Threat Control and Containment in Intelligent Networks. Philippe Roggeband - Product Manager, Security, Emerging Markets

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

No: NRHM/MIS/SERVER/1742/ /14972 Dated 1 st July 2013 CORRIGENDUM NO. 1 AND EXTENSION NOTICE

SONICWALL SECURITY HEALTH CHECK SERVICE

DPX8000 Series Deep Service Switching Gateway User Configuration Guide Firewall Service Board Module v1.0

ISG-600 Cloud Gateway

Next-Generation Firewall Series Datasheet

USG2110 Unified Security Gateways

Corrigendum 3. Tender Number: 10/ dated

Simple and Powerful Security for PCI DSS

Unified Threat Management Systems

NSG50/100/200 Nebula Cloud Managed Security Gateway

AccessEnforcer Version 4.0 Features List

PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

NETWORK FORENSIC ANALYSIS IN THE AGE OF CLOUD COMPUTING.

Cato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN

AT&T Endpoint Security

SaaS Flyer for Trend Micro

Symantec Network Security 7100 Series

SANGFOR AD Product Series

Quick Heal AntiVirus for Server. Optimized Antivirus Scanning. Low on Resources. Strong on Technology.

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

Hardening the Education. with NGFW. Narongveth Yutithammanurak Business Development Manager 23 Feb 2012

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

Stopping Advanced Persistent Threats In Cloud and DataCenters

USG 50/20/20W Sales Kits

Product Guide. McAfee Web Gateway Cloud Service

Huawei Cloud Fabric Data Center Security and Application Optimization Solution

Gigabit SSL VPN Security Router

Dynamic Datacenter Security Solidex, November 2009

Cyber Criminal Methods & Prevention Techniques. By

Klaudia Bakšová System Engineer Cisco Systems. Cisco Clean Access

Evaluation criteria for Next-Generation Firewalls

Network Security Protection Alternatives for the Cloud

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

Transcription:

First line of defense for your network Quick Heal Terminator (UTM) (Unified Threat Management Solution) Data Sheet

Future-ready security for small and mid-size enterprises Quick Heal Terminator is a high-performance, easy-to-use Unified Threat Management solution for small and mid-size enterprises. It is a robust solution for keeping your entire IT infrastructure stable, secure and productive. The new collaborative platform architecture brings network security, management, backup and recovery of UTM data and many other critical network services together under a single unified umbrella. This directly translates into better ROI, lower costs and a safer, more productive work environment. Network Security Quick Heal Terminator Connectivity Productivity Quick Heal Terminator is tailored to suit the complexity of emerging threat scenarios. This fully integrated product is the simpler and smarter way of replacing multiple security programs with one comprehensive solution. It is easy-to-use and install for small and mid-size enterprises. Firewall Remote users IDS/IPS (Intrusion detection/prevention) URL Content Filtering Internet Quick Heal Terminator Secured End User Anti Spam/Anti Malware VPN

Features: For Robust Security Firewall Quick Heal Terminator has powerful firewall that controls, manages communications traffic between internal and Internet network efficiently. Administrators can block or allow access for traffic between internal and external network based on the corporate security policy, simultaneously blocking unauthorized access. Inspection of networking information and application information, enforcement of security policy becomes easy and rapid with the Terminator firewall. The simplified UI of Quick Heal Terminator gives a faster setup environment and easy deployment of the custom rules. Gateway Antivirus and Mail Protection Quick Heal Terminator runs on powerful Quick Heal Gateway AntiVirus and scans all the incoming and outgoing traffic for Virus, Worms, Malwares, etc. right at the gateway which gives double layer of protection augmenting existing virus solutions. Virus protection for email scans inbound and outbound email messages and email attachments. AntiSpam scans and runs a series of tests on inbound email messages (SMTP and POP3 protocols) and also includes a White and Black list that can be edited by users. Quick Heal Mail protection scans mails at gateway level and checks for spamming attacks. Proving a robust security scan for mail management, it assures that the user has a spam free mail box. The solution also blocks and prevents spyware communication from already infected computers to spyware web sites on internet protects computers while simultaneously protecting the inside network. Intrusion Detection and Prevention System Intrusion detection scans inbound network traffic to detect Denial of Service (DoS), Distributed Denial of Service (DDoS) attacks, and attempts to exploit application vulnerabilities. Quick Heal Terminator also provides complete malware protection by working with the firewall to immediately block incoming traffic associated with intrusions. The IDS and IPS system scrutinize network traffic in real time and help fore-stall a broad range of Denial-of-Service attacks before they attack your network.

Web Control (URL and Content Filtering) Quick Heal Terminator allows you the control of how your employees use the Internet, providing you with easy-to-use tools to create, enforce, and monitor the right access policy for your organization. With the URL and Content filtering, administrators can specify the types of web sites that are inappropriate for groups of users in their organizations. It allows blocking of chat engines, gaming sites and downloading activities so that the expensive bandwidth can be re-directed for appropriate use. Terminator helps enforce acceptable usage policy, protects you from the legal liabilities of inappropriate content, reduces bandwidth congestion, and improves employee productivity. The unique live security service provides real time protection for malicious websites and PUAs. HTTP Request HTTP Request HTTP Request HTTP Request URL Filtering Other Applications (e.g. Firewall, Antivirus, Management) Quick Heal Terminator Optimezed Query Classification Detection & Classification Center Security Alliance

To Engineer Connectivity VPN The Quick Heal Terminator VPN uses a variety of advanced encryption methods to protect your data. Thus providing means for secure communications between branches and for building secure site-to-site connections. It supports IPSec, L2TP, PPTP and SSL which provide secure connection between remote users and support building of site-to-site connections. Bandwidth Manager Segments traffic to ensure or restrict bandwidth usage per interface/protocol, ensuring that the right users get the right bandwidth with Quick Heal Terminator. Administrator can allocate bandwidth based on user groups on the corporate network, thus prioritizing bandwidth for critical applications and enhancing productivity. Simplifies the IT administrator s task of allocating bandwidth on the basis of usage among users and user groups and saves the bandwidth cost of the company as you spend only on what you need. Multi-Link Manager and Load Balancing It simplifies the IT administrator s task to manage multiple ISP links. Supports routing of traffic based on speed and cost of lines. Quick Heal Terminator Load Balance feature allows the network administrator to use multiple ISP lines simultaneously for all users and balance the traffic load among available lines. This facilitates smart usage of corporate ISP lines depending upon their speed and cost. Automatic Link Failover The inbuilt Automatic Link Failover feature shifts network load from an inactive ISP line to an active ISP line reducing the network administrator s task to manually shift the lines. This feature automatically diverts the data traffic from inactive ISP to active ISP lines in case any of the ISP lines fail to perform. It accrues to reduced internet downtime. USB Internet Support Quick Heal Terminator supports usage of USB internet device for emergency situations. The plug and play system of Quick Heal Terminator supports all type USB internet devices and reduces chances of complete Internet downtime.

For Enhanced Productivity IT Policy Management It allows system administrators to formulate and apply IT policies on user, user group and at organizational levels. It helps in logical management of IT resources like bandwidth, authorization and role-based usage. Administration, Reporting and Monitoring Quick Heal Terminator is loaded with a simplified and user-friendly interface and has an inbuilt extensive monitoring and reporting system. It gives IP and user- defined details of internet access and reports of security breaches committed by a particular user. Quick Heal Terminator interface is a web based service and can be accessed from any workstation inside the network. The Quick Heal Terminator has a dashboard which gives administrator snap view of the running network status like top websites visited, top policy breaches, over all internet usage and download activities.

Terminator -TS Series T- T-2 T-3 T-0 THROUGHPUT & CONNECTIONS Firewall Throughput Antivirus Throughput IPSEC VPN Throughput SSL VPN Throughput IPSEC Tunnels Terminator Throughput Interfaces I/O Interfaces Concurrent Sessions Console Ports Model Upgradeable VPN TUNNELS Mobile User VPN (PPTP/SSL) Terminator -TM Series 200 Mbps 4 Mbps 6 Mbps 90 Mbps 60 40 Mbps 4 GBE 0000 2 47 Mbps 70 Mbps 22 Mbps 0 Mbps 8 6 Mbps 4 GBE 2000 2 70 Mbps 4 Mbps 26 Mbps 7 Mbps 0 Mbps 80000 2 90 Mbps 8 Mbps 360 Mbps 22 Mbps 300 30 Mbps 20000 NO 2 T-7 T-00 T-0 THROUGHPUT & CONNECTIONS Firewall Throughput 00 Mbps 200 Mbps 600 Mbps Antivirus Throughput 7 Mbps 20 Mbps 2 Mbps IPSEC VPN Throughput 400 Mbps 460 Mbps 60 Mbps IPSEC VPN Tunnels 23 2 300 SSL VPN Throughput 30 Mbps 390 Mbps 40 Mbps Terminator Throughput 4 Mbps 60 Mbps 200 Mbps Interfaces I/O Interfaces Concurrent Sessions 2000 390000 42000 Console Ports Model Upgradeable NO VPN TUNNELS /SSL) Mobile User VPN (PPTP/SSL) Terminator -TE Series 20 20 T-200 T-20 T-300 20 T-00 THROUGHPUT & CONNECTIONS Firewall Throughput 60 Mbps 68 Mbps 800 Mbps 400 Mbps Antivirus Throughput 300 Mbps 390 Mbps 47 Mbps 77 Mbps IPSEC VPN Throughput 80 Mbps 90 Mbps 22 Mbps 400 Mbps IPSEC Tunnels 3 36 430 480 SSL VPN Throughput 440 Mbps 460 Mbps 490 Mbps 600 Mbps Terminator Throughput 240 Mbps 290 Mbps 320 Mbps 90 Mbps Interfaces I/O Interfaces Concurrent Sessions 440000 460000 48000 70000 Console Ports Model Upgradeable NO VPN TUNNELS /SSL) 0 0 0 0 Mobile User VPN (PPTP/SSL) 0 0 0 0

Benefits: Business Benefits Safe working environment Promote a safe virus free network environment for complex e-commerce activity. Add to the reputation of your organization by providing a secure and safe network environment Employee Productivity It enhances employee productivity as it allows control over web access policies which ensures righteous use of internet facilities and discourages users to spend in non-productive sites like, gaming, social networking, and other restricted domains. Cost- effective bundled solution UTM solution combines all stand-alone security solutions in one appliance which provides effective performance better scalability and cost-effective means of securing the organization. Regulatory Compliance Ensure the organization s compliance to IT norms to avoid legal liabilities for IT audit procedures. Financial Benefits Consolidated Cost-effective Solution Amalgamated solution for all gateway level security for an organization that gives scalability in terms of investment in different stand alone solutions. Thus, you save on multiple investments. Optimum use of IT Resources With a check on use of internet and the upper layer protection of network you save on hidden cost of excessive bandwidth and hidden maintenance cost.

Technological Benefits Cumulative Network security Significantly reduces risks emerging from viruses, other malwares and inappropriate content entering and leaving your company. Provide another layer of robust anti-virus protection augmenting existing desktop virus solutions. Along with additional security and manageability tools like Firewall, IDS/IPS, VPN, Bandwidth Manager, etc. it provides total security solution in one box. Plug-and-Play Solution Easy deployable and manageable solution without much manual intervention and any major changes in existing network setup. Extensive Support for your Quick Heal Terminator Anytime a security issue arises you can contact our security experts to receive timely consultation and recommendations. With our country-wide presence we have better reach to our customer in any technical emergency that they face