A UTM is a device that scans your network for threats to defend you against malicious attacks. We use UTMs alongside other hardware and software to secure your network, preventing malicious attacks from accessing your data and systems.
Features of having a UTM in place:
Router – This device can be configured for use at the edge of your network and act as the main router for your internet connection
Anti-Malware – Software on the UTM can detect malware and remove it before it can get onto your systems
Sandboxing – inbuilt software tests packets of data before they are released onto your network. These packets are tested for issues, the software will detect the issues by activating the packets in a secure environment and then analysing the results
Encrypted VPN – allows the setup of encrypted VPN using IPSEC, IKEv2 and L2TP.
Firewall – Can configure firewall rules to allow and block traffic as needed.
Benefits of having a UTM:
Provides an enterprise grade network protection.
Scans and inspects all packets passing along your network.
Will protect and secure your network from malicious attacks.