Unified Threat Management (UTM)2018-12-03T15:41:18+00:00

Unified Threat Management (UTM)

A UTM is a device that scans your network for threats and defend against anything malicious. Working alongside other hardware and software, we will use this equipment and software to secure your network so that no malicious attacks can gain access to your network and data.

Features of having a UTM in place:

Router – This device can be configured for use at the edge of your network and act as the main router for your internet connection

Anti-Malware – Software on the UTM can detect malware and remove it before it can get onto your systems

Sandboxing – inbuilt software tests packets of data before they are released onto your network. These packets are tested for issues, the software will detect the issues by activating the packets in a secure environment and then analysing the results

Encrypted VPN – allows the setup of encrypted VPN using IPSEC, IKEv2 and L2TP.

Firewall –  Can configure firewall rules to allow and block traffic as needed.

Benefits of having a UTM:

Provides an enterprise grade network protection.

Scans and inspects all packets passing along your network.

Will protect and secure your network from malicious attacks.

This website uses cookies and third party services. Settings Accept

Tracking Cookies title

More content

Third Party Embeds Title

Some content