next-gen security solution: gateway protection
Post on 21-Jan-2018
216 Views
Preview:
TRANSCRIPT
www.Seqrite.com 1
Enterprise SecuritySolutions by
www.Seqrite.com 2
Webinar by: Rohit WaghmarePre - Sales Consultant: Gateway Securityrohit.waghmare@seqrite.com
www.Seqrite.com 3
Agenda
• What is Gateway Level Protection?
What is Firewall?
What is the need of Unified Management?
What is UTM?
Difference between UTM & Firewall
• Why you should switch to UTM-Gateway Level Protection
• Features and advantages offered by UTM.
• How Seqrite-Terminator helps to attain highest Safety, management and security
www.Seqrite.com
2016 - Average Day - Enterprise Attacks
www.Seqrite.com 5
Risk in Unprotected Network
• Cyber Attacks
• Hacking
• Spyware
• Virus
• Worms
• Trojan Horses
• Phishing
• Ransomeware attacks
• Unauthorized Usage
• Modification or Deletion of
Files
• Keystroke Loggings
• Malicious Attacks
• Adware
www.Seqrite.com 6
Basic function of a firewall
• A firewall is a network security system that
monitors & controls the incoming outgoing
network.
• A firewall typically establishes a barrier
between a trusted secured internet network
and another network.
• This can be software based , hardware
based or both software & hardware.
www.Seqrite.com 7
• Powrful Primary Shield
• All in one Solution
• User Friendly & Simple
• Only one Hardware
• ISP Load Balancing
• Faster Computation
• Secured VPN
• Comprehensive
Logging & Reporting
www.Seqrite.com 8
Evolution of UTM
Traditional Firewall NGFW UTM
• FIREWALL • FIREWALL• APPLICATION
CONTROL• IPS
• FIREWALL• APPLICATION CONTROL• IPS
• BANDWITH & QUOTA MANAGEMENT• CONTENT FILTERING
• LOAD BALANCING & AUTO-LINK FAILURE• VPN
• MAIL PROTECTION• ANTI-VIRUS
www.Seqrite.com
IT CHALLENGES FOR ENTERPRISE
9
www.Seqrite.com
SEQRITE TERMINATOR
10
www.Seqrite.com 11
How UTM Protects you
NETWORKING
• ISP Load Balancing
• Policy Based Routing
• Automatic Gateway Failover
• DNS & DHCP Server
• USB Internet Support 3G/4G
• IP & Port Forwarding
• Configurable LAN/WAN/DMZ
ports
• Link Aggregation
C0NTENT FILTERING
• Category Based
• Custom Web List
• http & https blocking
• Bandwidth limit for each
profile/user
• Time based access limit
• Bandwidth Management
• Data Quota Management
• Key Word Blocking
www.Seqrite.com 12
How UTM Protects you
FIREWALL & SECURITY
• FIREWALL
a)Traffic Logging
b)Predefined Firewall Rule
c)Zone Support
• Stateful Inspection
• Instrusion Prevention System
• Gateway Antivirus
MAIL PROTECTION
• Mail Antivirus & Anti-Spam
(SMTP,POP3 & IMAP)
• Attachment Control
• Keyword Blocking in email
www.Seqrite.com 13
How UTM Protects you
MONITORING & REPORTS
• Daily, weekly and Monthly
Report
• Log Viewer
• Alerts ( Email and SMS )
• Internal Services Usage
VPN
• IPSec
• PPTP
• SSL VPN
USER AUTHENTICATION
• Internal Database
• AD integration
• IP/MAC binding
• LDAP Integration
• Guest User support
ADMINISTRATION
• Web Portal Customization
• Backup & Restore Configuration
• Administrative Profile
Managent
• Multiple Administrative
Support
www.Seqrite.com 14
Ease of Management Group Creation
www.Seqrite.com 15
Ease of ReportsPolicy Breach Report
www.Seqrite.com 16
Seqrite Terminator UTM Models
Terminator Models T2S-10 T2S-30 T2S-60 T2M-100 T2M-250
Hardware ID T2S10 1035/1035S 3675 T2M100 T2M250
H/W Specs
CPU AMD AMD AMD AMD Intel
Speed 1.0 GHz 1.0 GHz 1.6 GHz 2.3GHz 3.50 GHz
# of cores 2 2 4 4 2
Cache per core 1 MB 1 MB 2 MB 4 MB 4 MB
RAM 1GB DDR3 2GB DDR3 2GB DDR3 4GB DDR3 4GB DDR3
Storage 16GB SSD16GB MLC CF / 32
GB SSD64GB SSD 128 GB SSD 240 GB SSD
Copper GbE ports 3 4 6 8 10
Console port 1 1 1 1 1
USB Ports 2 2 2 2 2
www.Seqrite.com 17
Thank You
• Call us at: 020-66813139
• Write to us at: utmsales@seqrite.com
• Visit us at: www.seqrite.com
No Matter how small or big you network .TERMINATOR is one point Powerful security Solution
top related