New UserGate UTM View larger

UserGate UTM

New product

Software Entensys UserGate UTM Is a gateway solution that allows you to p

More details

Software Entensys UserGate UTM Is a gateway solution that allows you to protect the corporate network from external Internet threats, traffic management and bandwidth, allows you to control Internet access policies and use of Internet applications. In the product Entensys UserGate UTM The possibility of "deep traffic analysis" of DCI is implemented, which makes it possible to effectively combat advanced Internet threats, including "zero-day threats". Entensys UserGate UTM Also protects users from tracking and negative advertising. UserGate UTM Integrates a firewall, an intrusion detection system, protection from malicious programs and viruses, a content filtering system, a VPN server and other functions in a single solution that is easy to install and administer. The product also implemented all sorts of functions, more in demand by large organizations. These include access control based on user identification, load balancing, bandwidth management, threat prevention, SSL analysis, application recognition, and others. UserGate UTM Can be used as a hardware-software complex or be installed on a virtual machine. Principle of operation UserGate UTM Based on the creation of rules applied to users / groups of users. The product allows administrators to control the flow of traffic and control user access to the Internet. Different rules can be used to allow or deny access to certain categories of sites, control downloads, use applications, set traffic restrictions and channel width. UserGate UTM It also allows you to monitor the use of the Internet and provides an opportunity to obtain detailed statistics. Network security and protection against network threats Firewall
Built-in UserGate UTM The firewall filters traffic passing through certain ports (for example, TCP, UDP), thereby protecting the network from hacker attacks and various types of intrusions based on the use of these protocols. Intrusion Detection and Prevention
The Intrusion Detection and Prevention System (IDPS) detects malicious activity within the network. The main task of the system is detection, recording and prevention of threats, as well as reporting. Identification of security problems usually occurs through the use of heuristic rules and analysis of signatures of known attacks. The IDPS system monitors and blocks similar attacks in real time. Possible preventive protection measures are blocking certain segments of network traffic, disconnection and notification of the network administrator. Cloud Antivirus
Cloud antivirus, developed and supported by Entensys, allows you to provide a high level of user protection without reducing system performance. The module allows you to send to the cloud the signatures of downloaded files and scripts, where they are checked for comparison with known dangerous applications. Entensys uses an hourly updated database, which currently contains several hundred thousand dangerous signatures and is filled with a number of non-proprietary systems and sandboxes. This approach is extremely effective at a high load, as it blocks malicious files, without affecting the speed of the system. Gateway antivirus for filtering files and attachments
For any organization, it is critical to protect the traffic that enters the local network from viruses and spyware. UserGate UTM uses the Kaspersky Lab anti-virus engine to check all incoming and outgoing traffic. Strong protection against modern threats
UserGate UTM It is able to detect in the downloadable content, scripts, files both known and still unknown malicious code. Different product modules analyze possible threats and prevent them. These include a firewall, an intrusion detection and prevention system, an application control module (at the L7 level), a cloud antivirus, an Internet filtering module, the use of reputation services, and special blacklisted lists. Improving the performance and reliability of the Internet Support for work with multiple providers
UserGate UTM Provides the ability to switch between available Internet channels from different providers or their joint use, which can significantly improve the reliability and fault tolerance of Internet access. Traffic management, channel balancing
The Traffic Management feature allows you to set the right priorities to level out the negative impact of users or applications that consume significant traffic on other users. All this allows to ensure the guaranteed quality of applications that are critical for the operation of the enterprise. Caching
Caching speeds up the service by downloading content from a previously stored local store. A caching proxy server keeps local copies of frequently requested resources, this allows you to significantly reduce the bandwidth consumed. High fault tolerance
The high fault tolerance function allows you to drastically reduce the risks that may arise due to malfunctions in the hardware on which the hardware is installed UserGate UTM . This function allows you to install the system on paired nodes and automatically switch the load between them in case of failures. The solution supports clustering and support for the failover cluster VRRP (active-passive). Traffic management and Internet access control Internet access control
UserGate UTM It provides control over the operation of web applications and Internet access by creating rules based on personalized policies. This provides a layered access to network resources and allows you to distribute the bandwidth between different applications and services. The Internet access control feature also allows you to automatically apply security settings to individual users and network infrastructure objects. Identifying Users
UserGate UTM Supports user authentication and application of firewall rules, content filtering, application control with support for such tools and authentication protocols to users, such as Active Directory, Kerberos, RADIUS, LDAP. Administrators can apply specific security policies to any user, a group of users, or, for example, to all unknown users. In addition, the product supports authentication via a web interface such as Captive Portal, support for temporary users, the application of rules to terminal services users through special agents, and the use of an authorization agent for Windows platforms. Support for the concept of BYOD (Bring Your Own Device)
It is possible to apply special access rules to any devices, including laptops, tablets, smartphones, used by users. UserGate UTM Allows you to set limits on the maximum number of devices per user (shared and simultaneously used), as well as specify a list of specific devices that the user can use to gain access to the network. Content filtering and application control Internet filtering
The use of the Internet filtering module significantly increases the security of the local network, because it allows for administrative control over the use of the Internet, uploads, and provides blocking visits to potentially dangerous resources, as well as, when necessary, non-work sites. Deep content analysis
UserGate UTM Morphological analysis of web pages for the presence of certain words and phrases. This allows you to control access to specific sections of the site without blocking the resource entirely at the category or domain level. Monitoring the use of social networks
UserGate UTM Allows you to block games and other applications for the most popular social networks. SSL Support
Along with the usual unencrypted traffic UserGate UTM Can also be configured to filter HTTPS traffic. In this case, the server on the fly performs the substitution of the certificate and uses a full set of filtering methods, including morphological content filtering. Blocking banners, pop-ups and tracking scripts
UserGate UTM Allows you to block banners and pop-ups based on knowledge of the most popular ad networks and the scripts they use. Application control
The application control function based on updatable signature databases can be used in firewall rules and bandwidth rules. This provides protection against threats associated with programs that have access to the Internet.
Featured
All options

UserGate UTM 4.X

Delivery in the form of a virtual image. OS: Multi-Platform
Delivery method: Electronic delivery
Product added to cart
Now you can checkout
Right to use (up to 25 users)
Price per copy (from 1 and more)
Reference: UGUTM425
31 400,00 rub.
Item added to cart
UserGate UTM 4.X
Description:
Right to use (up to 25 users)
Price:
31,400 rub.
Continue shopping
Go to shopping cart
Supply: To email. Delivery in electronic form is carried out within 1-5 working days after confirmation of payment.
Product added to cart
Now you can checkout
Right to use (up to 50 users)
Price per copy (from 1 and more)
Product number: UGUTM450
53 900.00 rub.
Item added to cart
UserGate UTM 4.X
Description:
Right to use (up to 50 users)
Price:
53 900 rub.
Continue shopping
Go to shopping cart
Supply: To email. Delivery in electronic form is carried out within 1-5 working days after confirmation of payment.
Product added to cart
Now you can checkout
Right to use (up to 75 users)
Price per copy (from 1 and more)
Reference: UGUTM475
71 600.00 rub.
Item added to cart
UserGate UTM 4.X
Description:
Right to use (up to 75 users)
Price:
71,600 rub.
Continue shopping
Go to shopping cart
Supply: To email. Delivery in electronic form is carried out within 1-5 working days after confirmation of payment.
Product added to cart
Now you can checkout
Right to use (up to 100 users)
Price per copy (from 1 and more) 86 500.00 rub.
Item added to cart
UserGate UTM 4.X
Description:
Right to use (up to 100 users)
Price:
86,500 rub.
Continue shopping
Go to shopping cart
Supply: To email. Delivery in electronic form is carried out within 1-5 working days after confirmation of payment.
Product added to cart
Now you can checkout
Right to use (up to 150 users)
Price per copy (from 1 and more) 116 100.00 rub.
Item added to cart
UserGate UTM 4.X
Description:
Right to use (up to 150 users)
Price:
116 100 rub.
Continue shopping
Go to shopping cart
Supply: To email. Delivery in electronic form is carried out within 1-5 working days after confirmation of payment.
Product added to cart
Now you can checkout
Right to use (up to 200 users)
Price per copy (from 1 and more) 142 100.00 rub.
Item added to cart
UserGate UTM 4.X
Description:
Right to use (up to 200 users)
Price:
142 100 rub.
Continue shopping
Go to shopping cart
Supply: To email. Delivery in electronic form is carried out within 1-5 working days after confirmation of payment.

UserGate UTM Advanced Threat Protection Module (1 year)

Advanced Threat Protection (ATP) module Includes:
  • A subscription to Entensys URL filtering 3.0;
  • Subscription to RKN lists, Phishing, Entensys white / black lists;
  • Subscription to morphological databases;
  • Antivirus engine Entensys Cloud Antivirus;
  • Adblock ad blocking module.
Interface languages: Russian
OS: Multi-Platform
Delivery method: Electronic delivery
Product added to cart
Now you can checkout
Right to use (up to 25 users)
Price per copy (from 1 and more) 9 420,00 rub.
Item added to cart
UserGate UTM Advanced Threat Protection Module (1 year)
Description:
Right to use (up to 25 users)
Price:
9 420 rub.
Continue shopping
Go to shopping cart
Supply: To email. Delivery in electronic form is carried out within 1-5 working days after confirmation of payment.
Product added to cart
Now you can checkout
Right to use (up to 50 users)
Price per copy (from 1 and more) 16 170.00 rub.
Item added to cart
UserGate UTM Advanced Threat Protection Module (1 year)
Description:
Right to use (up to 50 users)
Price:
16 170 rub.
Continue shopping
Go to shopping cart
Supply: To email. Delivery in electronic form is carried out within 1-5 working days after confirmation of payment.
Product added to cart
Now you can checkout
Right to use (up to 75 users)
Price per copy (from 1 and more) 21 480.00 rub.
Item added to cart
UserGate UTM Advanced Threat Protection Module (1 year)
Description:
Right to use (up to 75 users)
Price:
21 480 rub.
Continue shopping
Go to shopping cart
Supply: To email. Delivery in electronic form is carried out within 1-5 working days after confirmation of payment.
Product added to cart
Now you can checkout
Right to use (up to 100 users)
Price per copy (from 1 and more) 25 950.00 rub.
Item added to cart
UserGate UTM Advanced Threat Protection Module (1 year)
Description:
Right to use (up to 100 users)
Price:
25,950 rub.
Continue shopping
Go to shopping cart
Supply: Supply:
Supply:
Supply: Supply:
Supply:
Supply: Supply: Supply:
Supply:
Supply:
Supply:
Supply:
Supply:
Supply: Supply:
Supply:
Supply:
Supply: Supply:
Supply:
Supply: Supply:
Supply:
Supply: Supply: Supply:
Supply:
Supply:
Supply:
Supply:
Supply:
Supply: Supply:
Supply:
Supply:
Supply: Supply:

Supply:

Supply: Supply:
Supply: Supply:
Supply: Supply:
Supply:
Supply: Supply:
Supply:
Supply: Supply: Supply:
Supply:
Supply:
Supply:
Supply:
Supply:
Supply: Supply:
Supply:
Supply:
Supply: Supply:
Supply:
Supply: Supply:
Supply:
Supply: Supply: Supply:
Supply:
Supply:
Supply:
Supply:
Supply:
Supply: