This product hasn't been reviewed yet! Be the first to share your experience.
Leave a Review
Endian UTM Reviews (0)
G2 reviews are authentic and verified.
Here's how.
We strive to keep our reviews authentic.
G2 reviews are an important part of the buying process, and we understand the value they provide to both our customers and buyers. To ensure the value is retained, it's important to make certain that reviews are authentic and trustworthy, which is why G2 requires verified methods to write a review and validates the reviewer's identity before approving. G2 validates the reviewers identity with our moderation process that prevents inauthentic reviews, and we strive to collect reviews in a responsible and ethical manner.
There are not enough reviews of Endian UTM for G2 to provide buying insight. Below are some alternatives with more reviews:
1
Check Point Next Generation Firewalls (NGFWs)
4.5
(569)
Check Point Firewall. The Check Point Firewall Software Blade incorporates all of the power and capability of the revolutionary FireWall-1 solution while adding user identity awareness to provide granular event awareness and policy enforcement.
2
WatchGuard Network Security
4.7
(262)
WatchGuard has deployed nearly a million integrated, multi-function threat management appliances worldwide. Our signature red boxes are architected to be the industry's smartest, fastest, and meanest security devices with every scanning engine running at full throttle.
3
FortiGate-VM NGFW
4.7
(206)
FortiGate offers a network security platform, designed to deliver threat protection and performance with reduced complexity.
4
Cisco Meraki
4.3
(207)
Cisco Meraki is a cloud-managed IT solutions provider that simplifies the management of complex networks through a centralized, web-based dashboard. Their comprehensive product portfolio includes wireless access points, switches, security appliances, and IoT devices, all designed to deliver secure, scalable, and high-performance networking experiences.
Key Features and Functionality:
- Cloud-Managed Access: Meraki's wireless access points and switches enable seamless connectivity for users, devices, and applications, ensuring robust security and simplified management from the edge to the cloud.
- Software-Defined WAN (SD-WAN): Their SD-WAN solutions connect users and sites to applications over wide area networks without compromising security, speed, or user experience.
- Connected IoT Solutions: Meraki offers smart cameras and sensors that create intuitive and secure experiences for various environments, including workplaces and educational institutions.
- Centralized Management: The Meraki dashboard provides a unified platform to monitor, manage, and optimize the entire network infrastructure, offering real-time visibility and control.
Primary Value and User Solutions:
Cisco Meraki addresses the challenges of managing complex IT infrastructures by offering a cloud-first platform that simplifies deployment, monitoring, and troubleshooting. By integrating networking and security capabilities, Meraki enables organizations to deliver exceptional network experiences, enhance operational efficiency, and adapt to evolving business needs with agility. This approach reduces operational expenses and allows IT teams to focus on strategic initiatives rather than routine maintenance tasks.
5
Check Point Harmony SASE
4.5
(194)
Check Point Harmony SASE is a converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, cloud, SaaS or web. It delivers secure Zerto Trust Network Access (ZTNA) connectivity along web protection capabilities including Internet access control, malware protection, data loss prevention(DLP), and sandboxing, as well as a firewall as a service. The solution employs a hybrid architecture, combining on-device and cloud-based protections, which delivers market leading security and performance.
6
SonicWall Next Generation Firewall
4.1
(151)
SonicWall real-time breach detection and prevention solutions protect more than one million networks worldwide.
7
Sophos United Threat Management
4.1
(88)
The global network of highly skilled researchers and analysts, protecting businesses from known and emerging malware - viruses, rootkits and spyware.
8
Barracuda CloudGen Firewall
4.5
(46)
A Next-Generation firewall for the Cloud Era.
9
Cisco ASA 5500-X Series
4.3
(36)
The Cisco ASA 5500-X Series Adaptive Security Appliances are advanced network security devices designed to provide comprehensive protection for businesses of all sizes. These appliances integrate multiple security services, including firewall capabilities, intrusion prevention systems (IPS), virtual private network (VPN) support, and content security, into a single, unified platform. By combining these features, the ASA 5500-X Series offers robust defense mechanisms against a wide range of cyber threats, ensuring the integrity and confidentiality of network communications.
Key Features and Functionality:
- Application-Aware Firewall: Provides deep packet inspection to enforce security policies based on application types, enhancing control over network traffic.
- Intrusion Prevention System (IPS): Detects and prevents malicious activities by analyzing network traffic for known attack signatures.
- VPN Support: Offers secure remote access and site-to-site connectivity through SSL and IPsec VPN technologies.
- Content Security Services: Includes antivirus, antispam, antiphishing, and web filtering to protect against various online threats.
- Unified Management: Simplifies administration by consolidating multiple security services into a single platform, reducing operational complexity.
Primary Value and User Benefits:
The Cisco ASA 5500-X Series addresses the critical need for integrated and scalable network security solutions. By combining multiple security functions into a single appliance, it reduces the complexity and cost associated with deploying and managing separate security devices. This integration enhances the efficiency of threat detection and response, providing businesses with a robust defense against evolving cyber threats. Additionally, the series offers flexibility to scale security measures in line with organizational growth, ensuring long-term investment protection.
10
OpenCTI by Filigran
4.7
(31)
Filigran provides threat intelligence, adversary simulation and crisis response open solutions.
Discussions related to Endian UTM
Discussions for this product are not available at this time. Be the first one to Start a discussion
Pricing
Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.
Categories on G2
Explore More
Which live chat software is best for ecommerce
What platform offers the best integration with productivity tools?
What is the most cost-effective no-code platform for startups?


