pic4

Kinh Doanh


Mr Bảo

Mr Duy

Hotlines

0903115043 (Mr Duy)
0908449646 ( Mr Bảo )




    THÔNG TIN SẢN PHẨM

NUSOFT UTM-3000
Có hàng

Unified Threat Management
    CHI TIẾT TÍNH NĂNG
Thông số kỹ thuật.

Bảng so sánh sản phẩm - UTM.

Despite e-commerce’s worldwide potential, it brings along with itself various nuisances and security risks such as spam, viruses, Trojans, hacker attacks, etc.

Accordingly, Nusoft presents you with UTM-3000, the ultimate solution to spammers, viruses, network security and management concerns. Its multi-layered spam filtering and training mechanisms help enterprises filter out unwanted emails, merely keep the essential ones. As for malicious code such as Trojans, worms and viruses, all can be effectively kept out of the enterprise’s network using its inbuilt dual anti-virus engines (ClamAV and Sophos) along with IDP system, leaving hackers no chance and eliminating security threats once for all.

In addition, UTM-3000 also features SPI firewall, Web filtering, load balancing, QoS, application blocking, total VPN solution, etc., facilitating your network management with all the necessary utilities built into a single device. Better yet, all signatures are free of charge, which drastically lowers down your ownership cost.

Product Features

1.Full IPv6 Compatibility

The device is completely compatible with the mainstream Internet protocol of the future -- IPv6. There is no budget required for implementing another IPv6-based gateway simply for IPv4-to-IPv6 address translation.

2.Custom Network Interface Groups

Up to four network interfaces are available for defining as LAN, WAN, DMZ or network groups (groups are isolated from one another). Thus, UTM-3000 can serve as an internal firewall physically separating each subnet with its grouping feature. By so doing, it gives an extra layer of protection to your internal network and efficaciously prevents viruses or worms from spreading over the network.

3.Proactive Intrusion Detection and Prevention (IDP)

The IDP focuses on OSI layers 4 to 7 in inspecting for Internet attacks. In addition to blocking network-based security threats (updated every 30 minutes; self-defined signatures supported), the IT administrator will be instantly notified and presented with comprehensive reports for diagnosis upon occurrence of an attack.

4.Dual Virus-Scanning Engines

The inbuilt virus-scanning engines (ClamAV and Sophos) protect the enterprise’s network from over five thousand kinds of viruses, Trojans, spyware, phishing frauds, etc. In addition, the virus signatures are free of charge, offering you the most up-to-date protection at a minimum ownership cost.

5.High Spam-Filtering Accuracy

Spam filtering can reach 99% accuracy using spam training and multiple filtering mechanisms such as Fingerprint, Bayesian, Global/Personal Rule, Grey-/Black-/Whitelist, etc. Without the need for the IT administrator’s intervention, recipients may decide whether to retrieve quarantined mail through the Mail Notice generated by UTM-3000, greatly reducing the network management load.

6. Email Auditing and Archiving

To prevent the leakage of sensitive information assets, the IT administrator may set up audit rules for auditing emails prior to their delivery. Apart from that, enterprise emails can be archived for legal investigation and accessed from anywhere at anytime.

7.Comprehensive Mail Reports

IT administrators are provided with detailed logs and intuitively interpretable statistics for analyzing email handling, such as the outcome of spam filtering and virus scanning of a specific email.

8.TCP/IP-Based Application Blocking

The use of instant messaging (both login and file transfer), peer-to-peer sharing, multimedia streaming, web-based mail service, online gaming, VPN tunneling, remote controlling, etc. now can be effortlessly regulated by the means of application blocking.

9. A Total VPN Solution

UTM-3000’s VPN trunking capability ensures redundancy and bandwidth integration to IPSec and PPTP tunnels, greatly increasing the connection speed and stability. In addition, its SSL (Web) VPN connections adopt Hardware Authentication technology to verify the identity of users using simply hardware information rather than login information. Remote users are now offered fast and easy SSL (Web) VPN access without the need for complex configurations.
Most third party firewall products lack advanced VPN connection management and therefore result in security risks. In comparison, UTM-3000 secures highly confidential business information carried over the VPN with IDP and virus detection and provides advanced management such as QoS and authentication.

10.In- / Outbound Load Balancing & PBR

UTM-3000’s VPN trunking capability ensures redundancy and bandwidth integration to IPSec and PPTP tunnels, greatly increasing the connection speed and stability. In addition, its SSL (Web) VPN connections adopt Hardware Authentication technology to verify the identity of users using simply hardware information rather than login information. Remote users are now offered fast and easy SSL (Web) VPN access without the need for complex configurations.
Most third party firewall products lack advanced VPN connection management and therefore result in security risks. In comparison, UTM-3000 secures highly confidential business information carried over the VPN with IDP and virus detection and provides advanced management such as QoS and authentication.

11.Web Filtering Mechanism

The Web Filter employs a cloud-based URL database that has eight categories namely Anti-Social and Illegal, Pornographic and Abusive, Gaming and Gambling, Society and Commerce, Communication and Technology, Leisure, Information and Education, Other, and up to sixty-four subcategories. Website browsing now can be easily regulated by specifying simply the category instead of the URL, keyword, etc.
In addition to that, IT administrators are also allowed to restrict file transfers, MIME types and browser scripts, and will be provided with detailed logs and statistics for analysis.

12.Quality of Service (QoS) / Individual QoS

The QoS mechanisms allow IT administrators to base the bandwidth allocation on company’s network policy, preventing bandwidth being exhausted by minorities.

13.IM Recording

Conversations conducted in popular IM clients: MSN, Yahoo!, Skype, etc. can be faithfully recorded. Supervisors may effectively stop messaging from being used for recreational purposes.

Deployment

Product Highlights

Anti-Virus Anti-Spam Intrusion
Detection
& Prevention
SPI Firewall Co-Defense
System
Anomaly
Traffic
Detection
Total VPN
Solution

Web-Based UI

Multi-WAN
Load
Balancing
Link
Failover
Bandwidth
Management
Application
Blocking
Web Filtering AAA Server File Transfer
Blocking
Policy-
Oriented
Management

Authentication
Mechanisms

High
Availability
Policy-Based
Routing
Logging Email
Archive
Access
Mail Notice Email
Archiving
Email
Auditing

* Giao hàng miễn phí trong nội thành TP.Hồ Chí Minh.
* Hình ảnh trên có thể khác so với thực tế.

Vui lòng liên hệ Phòng Kinh Doanh (84-8)38295105 để được hỗ trợ tốt nhất.
Website: www.planet.vn    www.avgvietnam.com   www.o2security.vn   www.edimax.vn

Trung tâm tin học KHTN