Future-ready security for small and mid-size enterprises

Similar documents
Why an Intelligent WAN Solution is Essential for Mission Critical Networks

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Astaro Gateway Software Applications

Assuring Your Business Continuity

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

Network Security. Intertech Associates, Inc.

The Cisco ASA 5500 as a Superior Firewall Solution

Advantages of Managed Security Services

Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security

Cisco ASA 5500 Series Content Security Edition for the Enterprise

Cyberoam Perspective BFSI Security Guidelines. Overview

Cisco SR 520-T1 Secure Router

White Paper. ZyWALL USG Trade-In Program

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

Simple security is better security Or: How complexity became the biggest security threat

Firewall and UTM Solutions Guide

Securing the Small Business Network. Keeping up with the changing threat landscape

How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail

Achieving PCI-Compliance through Cyberoam

NetDefend Firewall UTM Services

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Quick Heal Exchange Protection 4.0

Cisco Small Business ISA500 Series Integrated Security Appliances

Unified Threat Management Throughput Performance

NetDefend Firewall UTM Services

Unified Threat Management: The Best Defense Against Blended Threats

Move over, TMG! Replacing TMG with Sophos UTM

User Documentation Web Traffic Security. University of Stavanger

Sophos Certified Architect Course overview

Fortigate Features & Demo

Content Scanning for secure transactions using Radware s SecureFlow and AppXcel together with Aladdin s esafe Gateway

Network Security. Network Security. Protective and Dependable. > UTM Content Security Gateway. > VPN Security Gateway. > Multi-Homing Security Gateway

Cisco ASA 5500 Series Anti-X Edition for the Enterprise

Industrial Firewalls Endpoint Security

Cisco ASA 5500 Series Business Edition

V1.4. Spambrella Continuity SaaS. August 2

What s New in ISA Server 2004 ISA Server 2004 contains a fullfeatured,

Advantages of Managed Security Services

Cyberoam Next-Generation Security. 11 de Setembro de 2015

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Next Gen Firewall and UTM Buyers Guide

74% 96 Action Items. Compliance

Why Choose Integrated VPN/Firewall Solutions over Stand-alone VPNs

Security. Quick Sales Guide

Remote-Access VPNs: Business Productivity, Deployment, and Security Considerations

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Firewall Defaults and Some Basic Rules

Solution Brief. Secure and Assured Networking for Financial Services

The Attacker s Target: The Small Business

Cisco IOS Advanced Firewall

Zscaler Internet Security Frequently Asked Questions

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

Nominee: Barracuda Networks

Cisco ASA 5500 Series Firewall Edition for the Enterprise

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Clavister InSight TM. Protecting Values

Check Point Security Administrator R70

Network protection and UTM Buyers Guide

:: Protecting your infrastructure ::

Cisco ISR Web Security with Cisco ScanSafe

Cisco ASA 5500 Series Firewall Edition for the Enterprise

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

NESCOT Cyberoam Training Academy

Worry-Free Business Security 6.0. External FAQ

Protecting the Infrastructure: Symantec Web Gateway

Cisco ASA 5500 Series Content Security Edition for the Enterprise

Firewall Migration. Migrating to Juniper Networks Firewall/VPN Solutions. White Paper

Unified Threat Management, Managed Security, and the Cloud Services Model

Next-Generation Firewalls: Critical to SMB Network Security

Emerging Trends in the Network Security Market in India, CY 2013

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

White paper. Cyberoam UTM. Cyberoam. 360 Protection. on a Shoe-String Budget. I sales@cyberoam.com

Readiness Assessments: Vital to Secure Mobility

Chapter 1 The Principles of Auditing 1

Symantec Endpoint Protection

Providing Secure IT Management & Partnering Solution for Bendigo South East College

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules

Deploying Firewalls Throughout Your Organization

Trend Micro Healthcare Compliance Solutions

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

SonicWALL Unified Threat Management. Alvin Mann April 2009

Chapter 9 Firewalls and Intrusion Prevention Systems

Network Security. Protective and Dependable. Pioneer of IP Innovation

Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper

MANAGED EXCHANGE SOLUTIONS Secure, Scalable and Compliant Hosted Environments

CMPT 471 Networking II

IBM Internet Security Systems

Cisco ASA 5500 Series VPN Edition for the Enterprise

SSL VPN Client Installation Guide Version 9

Endian Unified Threat Management

VPN. Date: 4/15/2004 By: Heena Patel

Inspection of Encrypted HTTPS Traffic

Scalable Secure Remote Access Solutions for OEMs

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

Cisco SA 500 Series Security Appliances

Cisco ASA 5500 Series SSL / IPsec VPN Edition for the Enterprise

PRODUCT CATEGORY BROCHURE. Juniper Networks Integrated

Transcription:

First line of defense for your network Quick Heal Terminator (UTM) (Unified Threat Management Solution) Data Sheet

Future-ready security for small and mid-size enterprises Quick Heal Terminator is a high-performance, easy-to-use Unified Threat Management solution for small and mid-size enterprises. It is a robust solution for keeping your entire IT infrastructure stable, secure and productive. The new collaborative platform architecture brings network security, management, backup and recovery of UTM data and many other critical network services together under a single unified umbrella. This directly translates into better ROI, lower costs and a safer, more productive work environment. Network Security Quick Heal Terminator Connectivity Productivity Quick Heal Terminator is tailored to suit the complexity of emerging threat scenarios. This fully integrated product is the simpler and smarter way of replacing multiple security programs with one comprehensive solution. It is easy-to-use and install for small and mid-size enterprises. Firewall Remote users IDS/IPS (Intrusion detection/prevention) URL Content Filtering Internet Quick Heal Terminator Secured End User Anti Spam/Anti Malware VPN

Features: For Robust Security Firewall Quick Heal Terminator has powerful firewall that controls, manages communications traffic between internal and Internet network efficiently. Administrators can block or allow access for traffic between internal and external network based on the corporate security policy, simultaneously blocking unauthorized access. Inspection of networking information and application information, enforcement of security policy becomes easy and rapid with the Terminator firewall. The simplified UI of Quick Heal Terminator gives a faster setup environment and easy deployment of the custom rules. Gateway Antivirus and Mail Protection Quick Heal Terminator runs on powerful Quick Heal Gateway AntiVirus and scans all the incoming and outgoing traffic for Virus, Worms, Malwares, etc. right at the gateway which gives double layer of protection augmenting existing virus solutions. Virus protection for email scans inbound and outbound email messages and email attachments. AntiSpam scans and runs a series of tests on inbound email messages (SMTP and POP3 protocols) and also includes a White and Black list that can be edited by users. Quick Heal Mail protection scans mails at gateway level and checks for spamming attacks. Proving a robust security scan for mail management, it assures that the user has a spam free mail box. The solution also blocks and prevents spyware communication from already infected computers to spyware web sites on internet protects computers while simultaneously protecting the inside network. Intrusion Detection and Prevention System Intrusion detection scans inbound network traffic to detect Denial of Service (DoS), Distributed Denial of Service (DDoS) attacks, and attempts to exploit application vulnerabilities. Quick Heal Terminator also provides complete malware protection by working with the firewall to immediately block incoming traffic associated with intrusions. The IDS and IPS system scrutinize network traffic in real time and help fore-stall a broad range of Denial-of-Service attacks before they attack your network.

Web Control (URL and Content Filtering) Quick Heal Terminator allows you the control of how your employees use the Internet, providing you with easy-to-use tools to create, enforce, and monitor the right access policy for your organization. With the URL and Content filtering, administrators can specify the types of web sites that are inappropriate for groups of users in their organizations. It allows blocking of chat engines, gaming sites and downloading activities so that the expensive bandwidth can be re-directed for appropriate use. Terminator helps enforce acceptable usage policy, protects you from the legal liabilities of inappropriate content, reduces bandwidth congestion, and improves employee productivity. The unique live security service provides real time protection for malicious websites and PUAs. HTTP Request HTTP Request HTTP Request HTTP Request URL Filtering Other Applications (e.g. Firewall, Antivirus, Management) Quick Heal Terminator imezed Query Classification Detection & Classification Center Security Alliance

To Engineer Connectivity VPN The Quick Heal Terminator VPN uses a variety of advanced encryption methods to protect your data. Thus providing means for secure communications between branches and for building secure site-to-site connections. It supports IPSec, L2TP, PPTP and SSL which provide secure connection between remote users and support building of site-to-site connections. Bandwidth Manager Segments traffic to ensure or restrict bandwidth usage per interface/protocol, ensuring that the right users get the right bandwidth with Quick Heal Terminator. Administrator can allocate bandwidth based on user groups on the corporate network, thus prioritizing bandwidth for critical applications and enhancing productivity. Simplifies the IT administrator s task of allocating bandwidth on the basis of usage among users and user groups and saves the bandwidth cost of the company as you spend only on what you need. Multi-Link Manager and Load Balancing It simplifies the IT administrator s task to manage multiple ISP links. Supports routing of traffic based on speed and cost of lines. Quick Heal Terminator Load Balance feature allows the network administrator to use multiple ISP lines simultaneously for all users and balance the traffic load among available lines. This facilitates smart usage of corporate ISP lines depending upon their speed and cost. Automatic Link Failover The inbuilt Automatic Link Failover feature shifts network load from an inactive ISP line to an active ISP line reducing the network administrator s task to manually shift the lines. This feature automatically diverts the data traffic from inactive ISP to active ISP lines in case any of the ISP lines fail to perform. It accrues to reduced internet downtime. USB Internet Support Quick Heal Terminator supports usage of USB internet device for emergency situations. The plug and play system of Quick Heal Terminator supports all type USB internet devices and reduces chances of complete Internet downtime.

For Enhanced Productivity IT Policy Management It allows system administrators to formulate and apply IT policies on user, user group and at organizational levels. It helps in logical management of IT resources like bandwidth, authorization and role-based usage. Administration, Reporting and Monitoring Quick Heal Terminator is loaded with a simplified and user-friendly interface and has an inbuilt extensive monitoring and reporting system. It gives IP and user- defined details of internet access and reports of security breaches committed by a particular user. Quick Heal Terminator interface is a web based service and can be accessed from any workstation inside the network. The Quick Heal Terminator has a dashboard which gives administrator snap view of the running network status like top websites visited, top policy breaches, over all internet usage and download activities.

Technical Specifications: Terminator -TS Series T-2 T-3 T-0 THROUGHPUT & CONNECTIONS Firewall Throughput 47 Mbps 70Mbps 90 Mbps Antivirus Throughput 70 Mbps 4Mbps 8Mbps VPN Throughput Terminator Throughput 6 Mbps 0Mbps 30Mbps Interfaces I/O Interfaces Concurrent Sessions 2000 80000 20000 Console Ports Model Upgradeable VPN TUNNELS Branch Office VPN (IP SEC) 2 2 2 Mobile User VPN (PPTP) Terminator -TM Series T-7 T-00 T-0 THROUGHPUT & CONNECTIONS Firewall Throughput Antivirus Throughput VPN Throughput Terminator Throughput Interfaces I/O Interfaces Concurrent Sessions Console Ports Model Upgradeable 00 Mbps 7 Mbps 4 Mbps 2000 200 Mbps 20Mbps 60Mbps 390000 600 Mbps 2 Mbps 200 Mbps 42000 No VPN TUNNELS Branch Office VPN (IP SEC) Mobile User VPN (PPTP) 20 20 20 Terminator -TE Series T-200 T-20 T-300 T-00 THROUGHPUT & CONNECTIONS Firewall Throughput 0 Mbps 68 Mbps 800 Mbps 400 Mbps Antivirus Throughput 300 Mbps 390 Mbps 47 Mbps 77 Mbps VPN Throughput Terminator Throughput 240 Mbps 290 Mbps 320 Mbps 90 Mbps Interfaces I/O Interfaces Concurrent Sessions 440000 460000 48000 70000 Console Ports Model Upgradeable No No VPN TUNNELS Branch Office VPN (IP SEC) 0 0 0 0 Mobile User VPN (PPTP) 0 0 0 0

Benefits: Business Benefits Safe working environment Promote a safe virus free network environment for complex e-commerce activity. Add to the reputation of your organization by providing a secure and safe network environment Employee Productivity It enhances employee productivity as it allows control over web access policies which ensures righteous use of internet facilities and discourages users to spend in non-productive sites like, gaming, social networking, and other restricted domains. Cost- effective bundled solution UTM solution combines all stand-alone security solutions in one appliance which provides effective performance better scalability and cost-effective means of securing the organization. Regulatory Compliance Ensure the organization s compliance to IT norms to avoid legal liabilities for IT audit procedures. Financial Benefits Consolidated Cost-effective Solution Amalgamated solution for all gateway level security for an organization that gives scalability in terms of investment in different stand alone solutions. Thus, you save on multiple investments. imum use of IT Resources With a check on use of internet and the upper layer protection of network you save on hidden cost of excessive bandwidth and hidden maintenance cost.

Technological Benefits Cumulative Network security Significantly reduces risks emerging from viruses, other malwares and inappropriate content entering and leaving your company. Provide another layer of robust anti-virus protection augmenting existing desktop virus solutions. Along with additional security and manageability tools like Firewall, IDS/IPS, VPN, Bandwidth Manager, etc. it provides total security solution in one box. Plug-and-Play Solution Easy deployable and manageable solution without much manual intervention and any major changes in existing network setup. Extensive Support for your Quick Heal Terminator Anytime a security issue arises you can contact our security experts to receive timely consultation and recommendations. With our country-wide presence we have better reach to our customer in any technical emergency that they face