All-in one security for large and medium-sized enterprise
Control Internet Access. Manage your Traffic. Protect against Advanced Threats.
UserGate UTM provides firewall, intrusion detection, antimalware, spam and content filtering, and VPN capabilities in one integrated package that can be installed and updated easily. For corporate use it also includes some advanced features such as identity-based access control, load balancing, quality of service (QoS), intrusion prevention, SSL inspection, and application awareness.
Enhanced Network Security
Protect your network against intrusions, external attacks, viruses, phishing, malware, Trojans, and other threats.
Advanced Threat Protection
Safeguard your company against advanced persistent threats and dangerous websites using real-time code analysis and reputation services.
Efficient Web Access Management
Enforce granular policies on user activities to prevent risky behavior; support the BYOD concept.
Better Internet Performance
Ensure uninterrupted connectivity and guarantee required bandwidth levels.
Hybrid Email Security
Protect against spam, viruses, zero-hour threats, phishing, spear phishing, spam, and other malicious messages.
Product Overview
UserGate UTM combines multiple security features into a single platform to protect your network, web, email, applications, and users against attacks, viruses, Trojans, spyware and spam. Sophisticated Entensys technologies such as Deep Content Inspection (DCI) allow you to intelligently manage traffic, control internet applications, and fight advanced, persistent threats. UserGate UTM is one of the fastest, most reliable, most agile gateway security products in the industry.
How does it work?
UserGate UTM works as a web security gateway. It is used as hardware appliance or it can be installed on any virtual server machine. UserGate UTM provides many security features and is able to easily add new network defense capabilities through security subscriptions.
UserGate UTM works on the basis of user account and applicable policies. The product lets administrators control and manage traffic flow and track web pages visited by employees. Numerous policies can be used to grant or restrict access to specific website categories, control downloads or application use, set traffic quotas, and keep detailed statistics.
Features
Network Security and Threat Protection
Network Firewall
The built-in firewall provides UserGate UTM with additional LAN protection against hacker attacks and other sophisticated types of protocol-based intrusions by blocking traffic through particular ports (TCP, UDP, or any other internet protocol).
Intrusion Detection and Prevention
IDPS (Intrusion Detection and Prevention System) is a network-based malicious activity monitoring solution. The primary purpose of IDPS is the detection of potentially dangerous activities, logging, and threat prevention and reporting.
Security breaches are usually detected with the help of heuristic rules and the analysis of signatures of known attacks. IDPS tracks activities in real time and quickly blocks attacks. Possible preventive measures include blocking particular segments of network traffic, disconnection, and notifying the network administrator.
Cloud Antivirus
Cloud Antivirus, developed and maintained by Entensys, makes it possible to provide a high level of user protection without reducing system performance. This module sends the signatures of uploaded files and scripts to the cloud. Entensys utilizes a database containing hundreds of thousands of dangerous files and script signatures that is updated hourly from a number of non-proprietary systems and sandboxes. This approach is extremely effective at high load because it blocks malicious files, addressing zero-hour problems without negatively affecting system performance.
Gateway Antivirus for File and Attachment Filtering
UserGate UTM incorporates the Kaspersky Labs antivirus engine to provide optional additional antivirus control and check all inbound and outbound traffic on HTTP, FTP, SMTP, and POP3.
Advanced Persistent Threat Detection
UserGate UTM detects known and previously-unknown web malware in scripts and downloads and detects command and control traffic from advanced persistent threats (APT). Various modules allow UserGate UTM to protect against a variety of potential threats. These include a firewall, intrusion detection and prevention, an application control module (at level 7), cloud antivirus, a web filtering module, reputation services, and special loadable blacklists. Entensys’s real-time reputation service containing a large number of known malicious and whitelisted files, scripts, and applications allows IT security administrators to easily and effectively stop the spread of emerging threats through their networks before they infect devices.
Increased Internet Performance and High Availability
Multiple ISPs and Connection Failover
Depending on the number of available lines, UserGate UTM can perform line failover and line cycling across multiple connected ISPs.
Web Caching
Web caching accelerates service requests by retrieving content saved from a previous request in local storage (cache). A caching proxy keeps local copies of frequently requested resources, reducing their bandwidth usage and cost, while significantly increasing performance.
Traffic Shaping
Traffic shaping makes it possible to manipulate and prioritize network traffic, thereby reducing the impact of heavy users or machines on other users. This bandwidth throttling or rate limiting guarantees that business-critical applications can function well.
High Availability
High Availability mode allows you to strongly reduce the risks and damages that could be caused by a UTM hardware crash. Deploying UserGate UTM in a High Availability pair allows for continuous uptime of the UserGate UTM services in the event that one of the nodes fails.
Traffic Management and Network Access Control
Network Access Control
UserGate UTM provides granular application and access control through the creation of accurate, identity-based policies. It ensures granular access to network resources and can limit bandwidth or allocate more bandwidth to certain applications or services. The Network Access Control functionality automatically enforces security policies for everyone and everything on your network, which helps you minimize your security risks.
User Identity Awareness
UserGate UTM supports authentication of users and enforcement of user-aware firewall rules, web filter settings, and Application Control 2.0 using Active Directory, Kerberos, RADIUS, and LDAP. Administrators can assign security policies to a specific user or group, or to general objects such as all known users, all unknown users, or both. The product also supports Transient users and Captive Portal authentication, which runs through a web interface before granting them access to internet resources. UserGate UTM Terminal Services Agent identifies individual users who are supported by the same terminal server, so all rules and policies can be also applied to terminal services users.
Text Message Authentication
UserGate UTM supports the SMPP protocol, which makes it possible to authenticate guest users via text message.
BYOD (Bring Your Own Device) Concept Support
UserGate UTM allows you to apply special access rules to any device accessing the network, including corporate and private laptops, tablets, and smartphones. UserGate UTM allows you to set limits on the maximum number of devices per user (total and used simultaneously) and create a list of specific devices that can be used to gain network access.
VPN Server
VPN (Virtual Private Network) technology protects the traffic of any intranet and extranet systems, audio- and video-conferences, and e-commerce solutions. UserGate UTM allows you to create a "server-to-server" tunnel or inter-network routing and supports current VPN connections.
Content Filtering and Application Control
Web Filtering
The Entensys URL Filtering module adds extra security to your local network. It is designed to enable administrative control over employee internet downloads and restrict access to potentially dangerous websites if needed.
Deep Content Analysis
UserGate UTM analyzes web pages for specific words and phrases, intelligently parsing the morphology of the most commonly-used languages. This kind of control is applied to specific sections of a site, without blocking the entire site at the category or domain level. This approach is useful for social networks, forums, and other portals with a large share of user-generated content (Web 2.0).
Social Media Control
UserGate UTM provides control over Web 2.0 applications and social media, enforcing granular policies on application functions and communications. Administrators can allow selective access to social media content while restricting non-productive activities. Granular control over content policies can ensure that employees' social media communications conform to company guidelines.
SSL Inspection
Alongside ordinary unencrypted traffic, UserGate UTM can be configured to filter HTTPS traffic. The server performs certificate-swapping and content filtering on the fly. UserGate UTM uses all of its filtering mechanisms to process HTTPS traffic.
Blocking of Banners, Pop-Ups and Spying Scripts
Pop-ups are the bane of web surfers – it’s all too easy to accidentally click on a link in an obnoxious ad image. UserGate UTM solves the problem of banners and third-party ad images by simply zapping banner ads before users can see them.
The product also protects your privacy by blocking invisible tracking cookies and plug-ins on many websites and preventing social networks from transmitting data about you after you leave those sites.
Injector: HTML Code Substitution
UserGate Web Filter makes it possible to modify the page code delivered to the user. It can be applied for the replacement of blocked content in order to insert specific information or advertising. This function may be useful for telecom operators and public WiFi access providers.
Application Control
Application control is designed to protect against security threats posed by internet-based applications. Its purpose is twofold: enable administrators to restrict the personal use of internet-based applications such as instant messengers or peer-to-peer clients, and protect the local network against application-specific internet threats.
Email Security
Cloud Antispam
The Entensys Cloud Antispam Module sends a UID of a message to our cloud-based service, which helps to determine whether the message contains spam, and continues to block this specific message or stop a spam attack instead of blocking the IP address, domain, or email address. This feature of Entensys Antispam makes it useful for companies where the deletion of messages considered to be spam can cause the loss of clients or other problems. Cloud Antispam filters messages based on their content and heuristics analysis. One of the main advantages of Entensys Cloud Antispam is its very low rate of false detections – less than one in 1.5 million messages – while its spam detection rate is over 97%.
Antivirus Protection
UserGate UTM uses Entensys Cloud Antivirus and the Kaspersky Labs AV engine, just as with HTTP-traffic.
Additional Spam Protection Methods
When processed by UserGate UTM, messages go through several filtering stages, including connection filtering, sender filtering, recipient filtering, and content filtering. Using some of these functions such as DNSBL allows UserGate UTM to significantly reduce the load on the system.
More features
Real-time Monitoring and Statistics
UserGate UTM features a full-fledged statistics module that allows administrators and supervisors to enforce the company’s internet access policy effectively. Statistics can prove the extent to which the internet is being abused in the workplace and can serve as the primary basis for decision-making when it comes to restricting or blocking certain internet resources for a specific user in order to fight such abuse.
Resource Publishing
Sometimes it may be necessary to make certain corporate services available externally. UserGate UTM is able to redirect requests sent to a gateway computer to the server or workstation where the target service is running, thus providing end users with the ability to access resources on the corporate network from a remote location.
DHCP Server
Dynamic Host Configuration Protocol (DHCP) allows an administrator to supervise and distribute IP addresses from a central point, automatically sending a new IP address when a computer is plugged into a different location in the network.
Remote Administration
UserGate UTM can be accessed remotely from any computer through a browser, making it possible to efficiently manage many locations or branch offices.
© Copyright 2000-2023 COGITO SOFTWARE CO.,LTD. All rights reserved