Venusense UTM Introduction

Similar documents
Systrome Next Gen Firewalls

Copyright Huawei Technologies Co., Ltd All rights reserved. Trademark Notice General Disclaimer

Next-Generation Firewall Series Datasheet

USG2110 Unified Security Gateways

Training UNIFIED SECURITY. Signature based packet analysis

ISG-600 Cloud Gateway

Medium / Large Enterprises Next-Generation UTM NU-850C

Medium / Large Enterprises Next-Generation UTM NU-850C

NIP6000 Next-Generation Intrusion Prevention System

AccessEnforcer Version 4.0 Features List

Data Sheet. DPtech IPS2000 Series Intrusion Prevention System. Overview. Series IPS2000-MC-N. Features

Security Assessment Checklist

APT Protection.

UTM Firewall Registration & Activation Manual DFL-260/ 860. Ver 1.00 Network Security Solution

Unified Threat Management Systems

Huawei Cloud Fabric Data Center Security and Application Optimization Solution

Managing SonicWall Gateway Anti Virus Service

DPtech IPS2000 Series Intrusion Prevention System User Configuration Guide v1.0

Eudemon 1000E. Eudemon 1000E Series Product Quick Reference. Huawei Technologies Co., Ltd.

UTM 5000 WannaCry Technote

Huawei NIP2000/5000 Intrusion Prevention System

AC750GW 750Mbps. Dual band Gigabit Wireless Router. Overview DATA SHEET. Highlights

NetDefend Firewall UTM Services

Eudemon200E-X Series Unified Security Gateway

All-in one security for large and medium-sized businesses.

H3C SecPath Series Firewalls and UTM Devices

Next-Generation Firewall Series Datasheet

Ethical Hacking and Prevention

NSG50/100/200 Nebula Cloud Managed Security Gateway

Future-ready security for small and mid-size enterprises

Corrigendum 3. Tender Number: 10/ dated

Gigabit SSL VPN Security Router

SteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS)

2 ZyWALL UTM Application Note

Cisco IOS Inline Intrusion Prevention System (IPS)

IxLoad-Attack TM : Network Security Testing

SonicOS Standard Release Notes SonicWALL Secure Anti-Virus Router 80 Series SonicWALL, Inc. Software Release: March 15, 2007

Network Security. Thierry Sans

Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates

Quick Sales Guide. Security

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network

EN6200 Series Feature Sheet

Security with Passion. Endian UTM Virtual Appliance

ASA/PIX Security Appliance

Security Made Simple by Sophos

HiPER 518W-Plus. 300Mbps Wireless 3G VPN Router. Overview. Features DATA SHEET. Highlights

Angelo Gentili Head of Business Development, EMEA Region, PartnerNET

Barracuda Firewall Release Notes 6.6.X

Evaluation criteria for Next-Generation Firewalls

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

Hardening the Education. with NGFW. Narongveth Yutithammanurak Business Development Manager 23 Feb 2012

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

McAfee Network Security Platform 9.2

Data Sheet. DPtech Anti-DDoS Series. Overview. Series

N-Dimension n-platform 340S Unified Threat Management System

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Certified Ethical Hacker (CEH)

Overview. Computer Network Lab, SS Security. Type of attacks. Firewalls. Protocols. Packet filter

CIS Controls Measures and Metrics for Version 7


User s Manual. How to configure and use FortGuard Professional Anti-DDoS Firewall

DELL SonicWALL Understanding Trend

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

DPX17000 Deep Service Core Switch

No: NRHM/MIS/SERVER/1742/ /14972 Dated 1 st July 2013 CORRIGENDUM NO. 1 AND EXTENSION NOTICE

Synchronized Security

Imperva Incapsula Product Overview

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

CIS Controls Measures and Metrics for Version 7

Secure and Always Online Networking for Small- to Medium-sized Businesses

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013

Network Security: Firewall, VPN, IDS/IPS, SIEM

IBM Proventia Network Multi-Function Security MX1004

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Introduction. The Safe-T Solution

Seqrite TERMINATOR (UTM) Unified Threat Management Solution.

Eudemon8000E-X Series

Security and Compliance Powered by the Cloud. Ben Friedman / Strategic Accounts Director /

Contents. Background. Use Cases. Product Introduction. Product Value

Distributed Systems. 29. Firewalls. Paul Krzyzanowski. Rutgers University. Fall 2015

Stopping Advanced Persistent Threats In Cloud and DataCenters

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1


SONICWALL SECURITY HEALTH CHECK PSO 2017

Key Features. DATA SHEET

Dynamic Datacenter Security Solidex, November 2009

SONICWALL SECURITY HEALTH CHECK SERVICE

Small Office Security 2. Mail Anti-Virus

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Secospace USG2000&5000 Datasheet

Surat Smart City Development Ltd. Surat Municipal Corporation 1

NETWORK THREATS DEMAN

Seqrite Endpoint Security

Microsoft Internet Security & Acceleration Server Overview

PineApp Mail Secure SOLUTION OVERVIEW. David Feldman, CEO

SONICWALL SECURITY HEALTH CHECK SERVICE

The SonicWALL SSL-VPN Series

Internet Security: Firewall

Cisco s Appliance-based Content Security: IronPort and Web Security

Fundamentals of Network Security v1.1 Scope and Sequence

Network Intrusion Detection for the E-Commerce Environment by Eddie Powell last updated Monday, July 10, 2000

Transcription:

Venusense UTM Introduction Featuring comprehensive security capabilities, Venusense Unified Threat Management (UTM) products adopt the industry's most advanced multi-core, multi-thread computing architecture, traffic parsing engine, as well as integrated software design that includes basic security functions, such as the firewall, anti-virus, IPS, content filtering, application identification, anti-spam, IPSEC/SSL VPN, anti-ddos system. In addition, Venusense UTM provides cloud-based security functions to protect against increasingly complex security threats as well as advanced centralized management solution and user friendly reporting.

Main functions Excellent firewall features Supports access control based on the source IP address, destination IP address, source port, destination port, time, service, user, file, URL, keyword, email address, script, and MAC address. Supports traffic management, connection count control, IP/MAC binding, and user authentication. Ten-gigabit application processing capability The IPS throughput of high-end UTM products reaches 15 Gbit/s. The AV throughput reaches 10 Gbit/s. The total application processing capability reaches at least 15 Gbit/s. The comprehensive application processing capability comes out top in the industry. Flexible port extension Venusense UTM supports various port combinations to meet different scenario requirements. Rich extensible modules In addition to extended ports, Venusense UTM has extensible modules including the DC power supply module, redundant power supply module, bypass interface module, LCD module, one-click configuration module (exclusive with LCD module), and SM encryption card (certain models) module. Solid IPS prevention system Venusense UTM has the sound attack library in the industry with more than 7,000 intrusion signatures. Venusense UTM uses the vulnerability mechanism analysis technology to precisely prevent hacker attacks, worms, Trojan, and backdoor. Venusense UTM uses the network abnormality analysis technology to completely prevent DoS attacks. Secure and multiple VPNs to simplify networking Multiple VPNs are supported with abundant applications. WLAN adaptation Venusense UTM can act as 802.11B and 802.11G wireless access points, provide complete security protection for wireless environments, and provide specific prevention from the gateway to desktop. Typically, traditional security gateways do not provide this function. By using this function, a specific host can be located and desktop access can be controlled in wireless environments of SMBs, which is impossible in traditional wireless router-access environments. Complete and efficient application prevention Venusense UTM provides all-round security protection by integrating application layer control-based deep filtering and prevention such as anti-virus, intrusion prevention, DDoS attack prevention, Internet behavior management (application management and control and URL filtering), content/behavior auditing, traffic control, and Web security protection. (1) Complete Internet behavior management Venusense UTM can recognize more than 2,000 applications (including more than 200 mobile applications) of 20 categories, and implements traffic control on more than 50 applications. Combining with user authentication, Venusense UTM can achieve user-based application recognition and control. (2) Web 2.0 Venusense UTM provides a separate Web 2.0 category library to protect Web 2.0 applications, which is the only Web 2.0 protection solution in the industry. This function can prevent threat data and control employees' Internet behaviors because there are backdoors in most web 2.0 applications and websites that provide web 2.0 application downloading. (3) Complete DDoS attack prevention Venusense UTM supports more than 20 types of attack prevention, including mainstream DDoS attacks such as SYN Flood, UDP Flood, ICMP Flood, HTTP Flood, and DNS Flood. Its exclusive fine-grained attack prevention parameter settings make prevention more precise. Moreover, its traffic statistics function visually displays the percentage and type of attack traffic among focused traffic in charts. (4) Industry-leading network anti-virus technology Venusense UTM has a virus library including more than 10,000,000 viruses and can prevent the file virus, macro virus, script virus, worm, Trojan, malicious software, greyware, and ARP virus. It achieves anti-virus against compressed files with the intelligent restore technology. (5) APT solution

The APT solution ensures user network security by combining the local signature library with the cloud. (6) Content/behavior auditing Venusense UTM supports auditing more than 10 types of contents and behaviors, such as website access, email sending and receiving, IM chatting, posting on a forum, sending outgoing files, and database access. This can be used for locating the causes of security events. (7) Deep content filtering Venusense UTM supports deep content analysis on HTTP, FTP, SMTP, and POP3 protocols, including control conditions such as the URL, file extension, email address, email subject keyword, URL content, and webpage content. It supports filtering characters included in URLs, keywords in the webpage content, and types of uploaded and downloaded files. At the same time, its anti-virus function and intrusion prevention function provide realtime event classified alert reports and global attack map. Users can view the level, name, type, IP address, protocol, and time of an event in real time in the Web interface. User Values Various security functions in one device Easy to use and maintain Professional security functions and performance Full range of product models from desktop to 2U Highlights of Venusense UTM Ease of use Quick configuration wizard By using the configuration wizard for quick configuration, users can finish the basic firewall policy configuration and security policy configuration within 30 seconds. Quick configuration via thumb driver Quick deploy multiple new devices. Reduce deployment workload for distributor s engineers. Improve their working efficiency. High performance More than 40 models (10 series) covering networks of all sizes with industry level performance. UTM-70E is the highest performance desktop UTM (Intel Bay Trail Platform Quad Core, no-fan design, low noise.) Professional security engines Anti-Virus Local engine & Kaspersky engine. 0-day attack defense based on behavior analysis and discovery learning technology. Flow and proxy virus scanning modes. IPS (Intrusion Prevention System) Powered by Venusense IPS team, with 20 years of R&D experience in attack & defense field Customize and update event features by using Venustech ADLab (Active Defense Laboratory). Vulnerability detection for specified target, intelligently generate the IPS template and prevention policy based on detection result. Anti-Spam & URL DB Cyren cloud anti-spam engine: Provide a high Spam detection. Determine whether an email is a Spam based on statistics of behavior of the sender. Cyren cloud URL database: precise blocking of unwanted websites. Customizable filtering blacklists and block illegal websites. Value added server solution for partners

Syslog server Distributor can collect device logs and generate independent custom reports (such as AV reports and IPS reports) for end users. Upgrade server For signatures (IPS, AV database) and function package (UTM OS version) updates. License server For license upload, activation, extension and transfer. Remote maintenance server. Distributor can log in to device remotely for remote fault diagnosis via the server. (Two login methods are supported: WEB login and SSH login). End user can back up three latest configuration files on server. UTM Deployment Scenario

Product Honors & Certifications UTM with highest-level and complete certifications in China Patented technology for UTM data processing (Patent No.: 201010270457.6) Patented technology for network virus detection (Patent No.: 00810102849.4) Patented technology for P2P application identification (Patent No.: 20081022623)0.4) Patented technology for virus and intrusion detection (Patent No.: 200610112692.4) According to IDC and CCID, Venustech accounts for the top 1 domestic market share of UTM for 5 continuous years till 2015. Finalist for 2016 Gartner UTM Magic Quadrant, and ranked No. 1 among domestic vendors for completeness of vision.