Introducing G2.ai, the future of software buying.Try now
Product Avatar Image
Endian UTM

By Endian

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at Endian UTM, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
0 out of 5 stars

How would you rate your experience with Endian UTM?

This product hasn't been reviewed yet! Be the first to share your experience.
Leave a Review

Endian UTM Reviews & Product Details

Product Avatar Image

Have you used Endian UTM before?

Answer a few questions to help the Endian UTM community

Endian UTM Reviews (0)

G2 reviews are authentic and verified.

There are not enough reviews of Endian UTM for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Check Point Next Generation Firewalls (NGFWs) Logo
Check Point Next Generation Firewalls (NGFWs)
4.5
(569)
Check Point Firewall. The Check Point Firewall Software Blade incorporates all of the power and capability of the revolutionary FireWall-1 solution while adding user identity awareness to provide granular event awareness and policy enforcement.
2
WatchGuard Network Security Logo
WatchGuard Network Security
4.7
(262)
WatchGuard has deployed nearly a million integrated, multi-function threat management appliances worldwide. Our signature red boxes are architected to be the industry's smartest, fastest, and meanest security devices with every scanning engine running at full throttle.
3
FortiGate-VM NGFW Logo
FortiGate-VM NGFW
4.7
(206)
FortiGate offers a network security platform, designed to deliver threat protection and performance with reduced complexity.
4
Cisco Meraki Logo
Cisco Meraki
4.3
(207)
Cisco Meraki is a cloud-managed IT solutions provider that simplifies the management of complex networks through a centralized, web-based dashboard. Their comprehensive product portfolio includes wireless access points, switches, security appliances, and IoT devices, all designed to deliver secure, scalable, and high-performance networking experiences. Key Features and Functionality: - Cloud-Managed Access: Meraki's wireless access points and switches enable seamless connectivity for users, devices, and applications, ensuring robust security and simplified management from the edge to the cloud. - Software-Defined WAN (SD-WAN): Their SD-WAN solutions connect users and sites to applications over wide area networks without compromising security, speed, or user experience. - Connected IoT Solutions: Meraki offers smart cameras and sensors that create intuitive and secure experiences for various environments, including workplaces and educational institutions. - Centralized Management: The Meraki dashboard provides a unified platform to monitor, manage, and optimize the entire network infrastructure, offering real-time visibility and control. Primary Value and User Solutions: Cisco Meraki addresses the challenges of managing complex IT infrastructures by offering a cloud-first platform that simplifies deployment, monitoring, and troubleshooting. By integrating networking and security capabilities, Meraki enables organizations to deliver exceptional network experiences, enhance operational efficiency, and adapt to evolving business needs with agility. This approach reduces operational expenses and allows IT teams to focus on strategic initiatives rather than routine maintenance tasks.
5
Check Point Harmony SASE Logo
Check Point Harmony SASE
4.5
(194)
Check Point Harmony SASE is a converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, cloud, SaaS or web. It delivers secure Zerto Trust Network Access (ZTNA) connectivity along web protection capabilities including Internet access control, malware protection, data loss prevention(DLP), and sandboxing, as well as a firewall as a service. The solution employs a hybrid architecture, combining on-device and cloud-based protections, which delivers market leading security and performance.
6
SonicWall Next Generation Firewall Logo
SonicWall Next Generation Firewall
4.1
(151)
SonicWall real-time breach detection and prevention solutions protect more than one million networks worldwide.
7
Sophos United Threat Management Logo
Sophos United Threat Management
4.1
(88)
The global network of highly skilled researchers and analysts, protecting businesses from known and emerging malware - viruses, rootkits and spyware.
8
Barracuda CloudGen Firewall Logo
Barracuda CloudGen Firewall
4.5
(46)
A Next-Generation firewall for the Cloud Era.
9
Cisco ASA 5500-X Series Logo
Cisco ASA 5500-X Series
4.3
(36)
The Cisco ASA 5500-X Series Adaptive Security Appliances are advanced network security devices designed to provide comprehensive protection for businesses of all sizes. These appliances integrate multiple security services, including firewall capabilities, intrusion prevention systems (IPS), virtual private network (VPN) support, and content security, into a single, unified platform. By combining these features, the ASA 5500-X Series offers robust defense mechanisms against a wide range of cyber threats, ensuring the integrity and confidentiality of network communications. Key Features and Functionality: - Application-Aware Firewall: Provides deep packet inspection to enforce security policies based on application types, enhancing control over network traffic. - Intrusion Prevention System (IPS): Detects and prevents malicious activities by analyzing network traffic for known attack signatures. - VPN Support: Offers secure remote access and site-to-site connectivity through SSL and IPsec VPN technologies. - Content Security Services: Includes antivirus, antispam, antiphishing, and web filtering to protect against various online threats. - Unified Management: Simplifies administration by consolidating multiple security services into a single platform, reducing operational complexity. Primary Value and User Benefits: The Cisco ASA 5500-X Series addresses the critical need for integrated and scalable network security solutions. By combining multiple security functions into a single appliance, it reduces the complexity and cost associated with deploying and managing separate security devices. This integration enhances the efficiency of threat detection and response, providing businesses with a robust defense against evolving cyber threats. Additionally, the series offers flexibility to scale security measures in line with organizational growth, ensuring long-term investment protection.
10
OpenCTI by Filigran Logo
OpenCTI by Filigran
4.7
(31)
Filigran provides threat intelligence, adversary simulation and crisis response open solutions.
Show More
Discussions related to Endian UTM

Discussions for this product are not available at this time. Be the first one to Start a discussion

Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Endian UTM
View Alternatives