Unified Threat Management (UTM) reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.
Unified threat management software and hardware provide dynamic firewalls that can provide other security services such as VPNs and malware detection.
To qualify for inclusion in the Unified Threat Management category, a product must:
Offered via the Check Point Infinity architecture, Check Point’s NGFW includes 23 Firewall models optimized for running all threat prevention technologies simultaneously, including full SSL traffic inspection, without compromising on security or performance.
For over 20 years, WatchGuard has pioneered cutting-edge cyber security technology and delivered it as easy-to-deploy and easy-to-manage solutions. Our unique approach to network security focuses on bringing best-in-class, enterprise-grade security to any organization, regardless of size or technical expertise. Ideal for SMBs and distributed enterprise organizations, our award-winning Unified Threat Management (UTM) appliances are designed from the ground up to focus on ease of deployment, use,
Barracuda's Cloud Generation Firewalls redefine the role of the Firewall from a perimeter security solution to a distributed network optimization solution that scales across any number of locations and applications, connects on-premises and cloud infrastructures, and helps organizations transform their business.
Check Point Capsule is one seamless solution that addresses all your mobile security needs. Capsule protects your mobile devices from threats, provides a secure business environment for mobile device use and protects business documents wherever they go.
Exosphere is the first UTM endpoint protection for SMBs and scans files in real-time using an advanced anti-malware engine. Exosphere provides multi-layered detection, that applies signature-based, heuristics, and emulation methods.
Kerio Control is a security solution that brings together next-generation firewall capabilities, intrusion detection and prevention (IPS), gateway anti-virus, VPN, and web content and application filtering in a single, easy-to-use package. With Kerio Control, your will be able to: • Configure your firewall with easy-to-use traffic rules • Control inbound and outbound communications by URL, application, traffic type and more • Connect your organization with a secure and easy-to-setup VPN • Monit
Aker raised the level of automation and created a true Digital Fortress to include a number of features in its NGFW Firewall that, in addition to preserving the network environment, enable the efficient management of data traffic. With Failover feature rules, exclusive of Aker UTM - NGFW, the solution automatically sets the priorities of the traffic on your network so that you can retain the services of your company always working.
CB Defense for VMware is a purpose-built solution with VMware AppDefense that provides advanced threat detection and in-depth application behavior insight to stop attacks in progress and accelerate response.
Get the visibility needed to proactively identify potential security issues and respond before they cause harm, with CenturyLink Analytics and Threat Management services. With CenturyLink® Analytics and Threat Management services, you get the visibility needed to proactively identify potential security issues and respond to them before they cause harm. And with our event and incident management and response services, you can ease the burden of having to develop and manage incident response in
Endian is the leading provider of open source network security and remote connectivity solutions. Our Unified Threat Management (UTM) hardware, software and virtual appliances provide comprehensive gateway security including firewall, VPN, web and email security services for small to large business networks.
Fusion's UTM is identity based, not location or physical topology. Deployment requires no changes to the user environment and the service can operate over existing customer equipment, providing the same level of data segmentation and security across all network types.
GajShield's extensive portfolio of Next Generation Firewall (NGFW) Appliances provides complete visibility into various threats and performance inhibitors allowing organisation to make informed and proactive security measure. GajShield firewall appliances provide powerful & integrated protection, enhance user productivity, granular policy definition, zero day protection providing pro-active security to networks and delivers real-time protection against fast moving threats like spyware, phish
ICS CUBE is the single solution of the whole set of issues small business network faces when using the Internet. Having Internet security as the primary focus, ICS CUBE is Unified Threat Management (UTM) other vital functions: internet access control and accountability, content filtering, internet gateway, mail server, web server, proxy server, antivirus, file storage and more. Small business firewall integrates with every component of ICS CUBE and graphical user interface provides a single poin
PoliWall TIG does the heavy lifting needed to reduce your attack surface and stop critical data losses. It is a threat intelligence gateway that blocks up to 90% of IP threats and domain threats before they hit your perimeter. It also stops data exfiltration attempts in their tracks with the same granular, automated and robust outbound filtering. PoliWall, it keeps the storm surge of attacks out and your valuable data in.
SafeGuard Cyber's leading Digital Risk Protection platform enables enterprises to detect, analyze, defend, and prevent cybersecurity attacks in real time – while automating governance and compliance. SafeGuard Cyber's platform can be rapidly deployed, and fully customizable compliance policies empower security, risk, and compliance professionals to delegate supervision and provide a better customer experience.
A Machine Learning and AI Platform built on Big/Fast Data Architecture for Breach Avoidance/Detection and Automated Elimination/Containment. It is an integrated solution with comprehensive threat detection and remediation built into a single platform which also covers continuous compliance, Incident response and a broad spectrum of use cases.