SlideShare a Scribd company logo
1 of 2
Download to read offline
Datasheet - Kerio Control (embed) | Kerio                                                                                                             Page 1 of 2



Datasheet
Kerio Control

Unified Threat Management
and Network Intelligence


Feature                     Feature description                                                 Benefit


                            • Transparent mapping of users from Active Directory and Open       • Easily configured in a Windows or Mac network
                              Directory.                                                        • Enforces network and web access policies tailored to individual
           User       • User-specific access policies.                                            users regardless of the access device used.
           Management
                            • Forced user authentication for network access.                    • Administrators and managers can precisely monitor web
                            • User-based network activity reports.                                behavior of individuals and groups.

                            • Integrated gateway anti-virus, web filter, P2P networks filter,   • Protects networks and users from viruses, spyware, drive-by
           Unified            VLAN tagging 802.1Q, intrusion prevention system, file-type         downloads, and other malware.
           Threat             blocker, flexible keyword and web object filter.                  • Protects companies from legal liabilities and helps limit
           Management                                                                             productivity losses.

                            • Multiple site-to-site and client-to-site VPN tunnels.             • Simplifies VPN deployment for advanced VPN setups.
                            • Includes a cross-platform VPN client for Windows, Mac, and        • One-click Kerio VPN Client ensures high-speed secure access
           VPN                Linux.                                                              for any user from any computer.



                            • Multi-port active/active and active/passive configurations with • Ensures high-availability of network uptime with optimized
                              automatic connection failover and link load balancing.            performance and maximum throughput.
           Quality of       • Bandwidth Management easily reserves and caps bandwidth for • Guarantees bandwidth for critical applications and provides
           Service
                              specific network traffic types.                                   simple control of network traffic by type, user, group, quota,
                                                                                                and more.




                                                                                                                 Awards & Reviews

                                                                                                                 PC Magazine - Editor's Choice
                                                                                                                 Rated: Very Good
                                                                                                                 "I found the software extremely easy to understand
                                                                                                                 and navigate. ...simplest VPN...scale better than
                                                                                                                 competing firewall appliance."
                                                                                                                 -Mario Morejon, PC Magazine

                                                                                                                 SC Magazine
                                                                                                                 Rated: Four out of five stars
                                                                                                                 "Very nice software firewall with anti-virus and web
                                                                                                                 filtering."
                                                                                                                 -Peter Stephenson, SC Magazine

                                                                                                                 CRN - Recommended
                                                                                                                 Rated: Five stars
                                                                                                                 "Every feature that you can need and more."
                                                                                                                 -CRN Integrator, CRN




                                                                                                                 Testimonial

                                                                                                                 "The ease in which Kerio Control can be installed and
                                                                                                                 configured compared to SonicWall is no contest.
                                                                                                                 Kerio Control is an easy recommendation to our
                                                                                                                 clients. They are eager to make the switch."
                                                                                                                 -Nick Hoague and Ray Lund, OnePointSync



Monitor employee productivity and web usage statistics with on-demand
on-line reports or automated email reports from Kerio Control Statistics.


                                                              Connect. Communicate. Collaborate. Securely. | 1-888-77-KERIO | www.kerio.com




http://www.kerio.com/node/8086                                                                                                                       31.10.2012.
Datasheet - Kerio Control (embed) | Kerio                                                                                                                     Page 2 of 2
Everything you like about Kerio Control software,
wrapped in performance optimized hardware.
Kerio Control Box.



  Kerio Control Box
  Hardware Models         Kerio Control Box 1110                        Kerio Control Box 3110                      Software system requirements
  Users Included           5 users (add-on user licenses available)     5 users (add-on user licenses available)    Software          Virtual
                                                                                                                    Appliance         Appliance             Windows
  Software                Kerio Control with Sophos Anti-Virus and Kerio Control Web Filter
                                                                                                                    500 MHz CPU       2 GHz CPU             1 GHz CPU
  Features                                                                                                          1 GB RAM          1 GB RAM              1 GB RAM
                                                                                                                                      (assigned)
   Chassis                 Desktop                                      1U rack mount
                                                                                                                    8 GB HDD          8 GB HDD              8 GB HDD
   Dimensions (in/mm)      10.7 x 7.7 x 1.7 / 272 x 195 x 44            16.8 x 10.7 x 1.7 / 426 x 450 x 44                            (assigned)
   Weight (lbs/kg)         5 / 2.26                                     15 / 6.8                                    2 Gigabit NICs    2 NICs (assigned)     2 Gigabit NICs
   Gigabit Ethernet        4 ports                                      8 ports                                     OS included        OS included          Windows 2000/
                                                                                                                                                            XP/Vista/7
   Power Input             60W                                          200W                                                           VMware
                                                                                                                                       Workstation/         Windows Server
   Compact Flash Disk      Industrial Grade 4 GB                        Industrial Grade 8 GB                                          Server/ESX/ESXi/     2000/2003/2008
                                                                                                                                       Fusion/Player        (32 or 64 bit)
   Memory                  2 GB                                         2 GB
                                                                                                                                       Parallels Desktop/
   Processor               Intel 1.5 Ghz                                Intel Dual Core 2.6 Ghz                                        Server for Mac
   Warranty                Standard 1-year warranty                     Standard 1-year warranty                                       Hyper-V
   *Hardware models not available in all markets.


FLEXIBLE DEPLOYMENT &                                          INTRUSION PREVENTION SYSTEM                               BANDWIDTH MANAGEMENT & QOS
ADMINISTRATION                                                 The IPS engine transparently monitors inbound             Kerio Control empowers IT admins to fine-tune
Whether using a bare metal ISO installation,                   and outbound network communication to                     bandwidth management rules to guarantee
virtualized infrastructure, or Kerio Control Box               identify suspicious activity. Protects servers            bandwidth for high-prioritiy network traffic types
hardware appliance, all deployments easily scale               behind the firewall from unauthorized                     (like VoIP or video conferencing) and restrict
as needs change. With simultaneous support for                 connections, typically originated by an Internet          bandwidth for low-priority network traffic types.
IPv4 and IPv6 traffic, organizations can securely              bot or hacker trying to exploit an available              Create rules by user/group, specific protocol,
begin preparations for the inevitable move to                  service. Daily IPS Blacklist updates provide quick        DSCP value, and more. Monitor bandwidth usage
IPv6. VLAN support brings greater flexibility                  response to the rapidly evolving source of                with real-time traffic charts. Use multiple
when managing large networks. IT admins have                   threats. Works in tandem with the firewall and            connections simultaneously with automatic link
complete access to securely configure Kerio                    content filtering capabilities to prevent malware         load balancing and maintain Internet uptime
Control from anywhere via a web browser –                      on the network.                                           with active/passive or active/active failover.
even from an iPad.
                                                               NETWORK ANALYSIS & REPORTING
A COMPLETE SECURITY SERVICE                                    Kerio Control Statistics, the built-in statistics         Industry certification
Kerio Control features integrated Sophos Anti-                 and reporting module, provides detailed
Virus and Kerio Control Web Filter as                          statistical and graphical reports on employee
additional security services for maximum                       internet usage activity. With access to on-
protection. Real-time operation of the integrated              demand online reports and automated daily,
AV engine allows administrators to specify                     weekly or monthly email reports, IT and
critical web and email protocols to be scanned,                business managers can immediately uncover
ensuring maximum security against the latest                   hidden productivity losses, security risks, or
viruses, spyware, software vulnerabilities and                 potential legal liability issues stemming from
other malicious code.                                          misuse of IT resources.                                   About Kerio Technologies, Inc.
                                                                                                                         Innovating in Internet security since 1997, Kerio
                                                                                                                         Technologies, Inc. provides unified communications,
The Kerio Control Web Filter web content
                                                               VPN REMOTE ACCESS                                         collaboration and security solutions for small to
filtering service blocks 141 categories of web                 Kerio Control VPN provides unlimited VPN                  medium sized businesses and organizations that are
content that may have an adverse effect on both                                                                          simple, stable, and secure.
                                                               tunnels for both site-to-site and client-to-site
the productivity and security of the network.                  scenarios, and offers both persistent and on-             Kerio is headquartered in San Jose, California, and
Administrators can prevent users from visiting                 demand modes with cross-platform flexibility.             has offices in New York, Germany, the United
websites that are known to contain malicious                   Connect multiple branch offices into a single             Kingdom, the Czech Republic, Australia, and Russia.
content, including viruses, spyware, Trojans, or               manageable network and give remote workers a              Kerio has more than 5,000 channel partners who
web pages that engage in phishing attacks or                                                                             support more than 50,000 customers in over 108
                                                               reliable secure tunnel with license-less VPN
                                                                                                                         countries.
online identity thefts. Kerio Control Web Filter is            clients for Windows, Mac and Linux. Scan VPN
flexible enough to block users or groups from                  traffic with integrated anti-virus. Supports              © 2012 Kerio Technologies, Inc. All rights reserved.
websites or categories during business hours,                  standard encryption algorithms: SSL for the               The names of actual companies and products
but can grant access during lunch for example.                 control channel (TCP) and Blowfish for the data           mentioned herein may be the trademarks of their
                                                               transport (UDP).                                          respective owners.
                                                                                                                         Published 10/2012



                                                                      Connect. Communicate. Collaborate. Securely. | 1-888-77-KERIO | www.kerio.com




http://www.kerio.com/node/8086                                                                                                                               31.10.2012.

More Related Content

What's hot

Multi domain security-management_technical_presentation
Multi domain security-management_technical_presentationMulti domain security-management_technical_presentation
Multi domain security-management_technical_presentationdavebrosnan
 
Internet Security in corporate environment
 Internet Security in corporate environment Internet Security in corporate environment
Internet Security in corporate environmentMASIT MACEDONIA
 
Measuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyMeasuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyIxia
 
Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02frank4dd
 
Measure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityMeasure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityIxia
 
What's new in zimbra 8 presentation
What's new in zimbra 8 presentationWhat's new in zimbra 8 presentation
What's new in zimbra 8 presentationsolarisyourep
 
Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012Symantec
 
KASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATIONKASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATIONGS CHO
 
Firewall Testing Methodology
Firewall Testing MethodologyFirewall Testing Methodology
Firewall Testing MethodologyIxia
 
Cyberoam ssl vpn_management_guide
Cyberoam ssl vpn_management_guideCyberoam ssl vpn_management_guide
Cyberoam ssl vpn_management_guidesupport_cyberoam
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec
 
Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Ricardo Resnik
 
How to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation FirewallsHow to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation FirewallsIxia
 
Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517Zscaler
 
BreakingPoint FireStorm CTM Datasheet
BreakingPoint FireStorm CTM DatasheetBreakingPoint FireStorm CTM Datasheet
BreakingPoint FireStorm CTM DatasheetIxia
 
Cross selling 5
Cross selling 5Cross selling 5
Cross selling 5Sen Nathan
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1PROIDEA
 
Sierraware browser isolation
Sierraware browser isolationSierraware browser isolation
Sierraware browser isolationSierraware
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduseIDG Romania
 

What's hot (20)

Multi domain security-management_technical_presentation
Multi domain security-management_technical_presentationMulti domain security-management_technical_presentation
Multi domain security-management_technical_presentation
 
Internet Security in corporate environment
 Internet Security in corporate environment Internet Security in corporate environment
Internet Security in corporate environment
 
Measuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyMeasuring Private Cloud Resiliency
Measuring Private Cloud Resiliency
 
Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02
 
Measure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityMeasure Network Performance, Security and Stability
Measure Network Performance, Security and Stability
 
What's new in zimbra 8 presentation
What's new in zimbra 8 presentationWhat's new in zimbra 8 presentation
What's new in zimbra 8 presentation
 
Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012
 
KASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATIONKASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATION
 
Firewall Testing Methodology
Firewall Testing MethodologyFirewall Testing Methodology
Firewall Testing Methodology
 
Cyberoam ssl vpn_management_guide
Cyberoam ssl vpn_management_guideCyberoam ssl vpn_management_guide
Cyberoam ssl vpn_management_guide
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
 
Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3
 
How to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation FirewallsHow to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation Firewalls
 
Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517
 
BreakingPoint FireStorm CTM Datasheet
BreakingPoint FireStorm CTM DatasheetBreakingPoint FireStorm CTM Datasheet
BreakingPoint FireStorm CTM Datasheet
 
checkpoint
checkpointcheckpoint
checkpoint
 
Cross selling 5
Cross selling 5Cross selling 5
Cross selling 5
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
 
Sierraware browser isolation
Sierraware browser isolationSierraware browser isolation
Sierraware browser isolation
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduse
 

Similar to Kerio Control Datasheet Provides Unified Threat Management

Netrounds Product Sheet
Netrounds Product SheetNetrounds Product Sheet
Netrounds Product SheetMarcus Friman
 
Microsoft Office 365
Microsoft Office 365Microsoft Office 365
Microsoft Office 365Iconnyx
 
Quiterian analytics
Quiterian analyticsQuiterian analytics
Quiterian analyticsMode Baldeh
 
BreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetBreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetIxia
 
SMT Global Services
SMT Global ServicesSMT Global Services
SMT Global Servicessmtmarketing
 
Migrating To Cloud & Security @ FOBE 2011
Migrating To Cloud & Security @ FOBE 2011Migrating To Cloud & Security @ FOBE 2011
Migrating To Cloud & Security @ FOBE 2011commandersaini
 
Power Admin Server Monitor™
Power Admin Server Monitor™Power Admin Server Monitor™
Power Admin Server Monitor™Power Admin LLC
 
AiRS - ABITS technical introduction (2002)
AiRS - ABITS technical introduction (2002)AiRS - ABITS technical introduction (2002)
AiRS - ABITS technical introduction (2002)Jordi Duran i Batidor
 
SMT Global Services
SMT Global ServicesSMT Global Services
SMT Global Servicessmtmarketing
 
Webmetrics Graphical Overview
Webmetrics Graphical OverviewWebmetrics Graphical Overview
Webmetrics Graphical OverviewJason_Volm
 
ferdinand ccna4 certificate
ferdinand ccna4 certificateferdinand ccna4 certificate
ferdinand ccna4 certificateFERDINAND JOSIAH
 
Got Personally-Owned Devices? Manage Them with System Center
Got Personally-Owned Devices? Manage Them with System CenterGot Personally-Owned Devices? Manage Them with System Center
Got Personally-Owned Devices? Manage Them with System CenterC/D/H Technology Consultants
 
OptiFiber Pro OTDR
OptiFiber Pro OTDROptiFiber Pro OTDR
OptiFiber Pro OTDRlenlax
 
OptiFiber Pro OTDR
OptiFiber Pro OTDROptiFiber Pro OTDR
OptiFiber Pro OTDRlenlax
 
Quick wins in the NetOps Journey by Vincent Boon, Opengear
Quick wins in the NetOps Journey by Vincent Boon, OpengearQuick wins in the NetOps Journey by Vincent Boon, Opengear
Quick wins in the NetOps Journey by Vincent Boon, OpengearMyNOG
 
Private Clouds - Business Agility Seminar
Private Clouds - Business Agility SeminarPrivate Clouds - Business Agility Seminar
Private Clouds - Business Agility SeminarExponential_e
 

Similar to Kerio Control Datasheet Provides Unified Threat Management (20)

Netrounds Product Sheet
Netrounds Product SheetNetrounds Product Sheet
Netrounds Product Sheet
 
3 Reasons to Throwaway Requirements
3 Reasons to Throwaway Requirements3 Reasons to Throwaway Requirements
3 Reasons to Throwaway Requirements
 
Microsoft Office 365
Microsoft Office 365Microsoft Office 365
Microsoft Office 365
 
Quiterian analytics
Quiterian analyticsQuiterian analytics
Quiterian analytics
 
Cisco Routing and Switching vs Cisco Security
Cisco Routing and Switching vs Cisco SecurityCisco Routing and Switching vs Cisco Security
Cisco Routing and Switching vs Cisco Security
 
BreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetBreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data Sheet
 
SMT Global Services
SMT Global ServicesSMT Global Services
SMT Global Services
 
Migrating To Cloud & Security @ FOBE 2011
Migrating To Cloud & Security @ FOBE 2011Migrating To Cloud & Security @ FOBE 2011
Migrating To Cloud & Security @ FOBE 2011
 
Power Admin Server Monitor™
Power Admin Server Monitor™Power Admin Server Monitor™
Power Admin Server Monitor™
 
CISQ Introduction & Objectives - Dr. Bill Curtis
CISQ Introduction & Objectives - Dr. Bill CurtisCISQ Introduction & Objectives - Dr. Bill Curtis
CISQ Introduction & Objectives - Dr. Bill Curtis
 
AiRS - ABITS technical introduction (2002)
AiRS - ABITS technical introduction (2002)AiRS - ABITS technical introduction (2002)
AiRS - ABITS technical introduction (2002)
 
SMT Global Services
SMT Global ServicesSMT Global Services
SMT Global Services
 
Webmetrics Graphical Overview
Webmetrics Graphical OverviewWebmetrics Graphical Overview
Webmetrics Graphical Overview
 
ferdinand ccna4 certificate
ferdinand ccna4 certificateferdinand ccna4 certificate
ferdinand ccna4 certificate
 
Got Personally-Owned Devices? Manage Them with System Center
Got Personally-Owned Devices? Manage Them with System CenterGot Personally-Owned Devices? Manage Them with System Center
Got Personally-Owned Devices? Manage Them with System Center
 
OptiFiber Pro OTDR
OptiFiber Pro OTDROptiFiber Pro OTDR
OptiFiber Pro OTDR
 
OptiFiber Pro OTDR
OptiFiber Pro OTDROptiFiber Pro OTDR
OptiFiber Pro OTDR
 
Quick wins in the NetOps Journey by Vincent Boon, Opengear
Quick wins in the NetOps Journey by Vincent Boon, OpengearQuick wins in the NetOps Journey by Vincent Boon, Opengear
Quick wins in the NetOps Journey by Vincent Boon, Opengear
 
Who is naalium
Who is naaliumWho is naalium
Who is naalium
 
Private Clouds - Business Agility Seminar
Private Clouds - Business Agility SeminarPrivate Clouds - Business Agility Seminar
Private Clouds - Business Agility Seminar
 

More from rkoscak

PaperCut NG katalog, Hrvatska verzija
PaperCut NG katalog, Hrvatska verzijaPaperCut NG katalog, Hrvatska verzija
PaperCut NG katalog, Hrvatska verzijarkoscak
 
PaperCut Fact Sheet Overview
PaperCut Fact Sheet OverviewPaperCut Fact Sheet Overview
PaperCut Fact Sheet Overviewrkoscak
 
PaperCut Solutions For Education
PaperCut Solutions For EducationPaperCut Solutions For Education
PaperCut Solutions For Educationrkoscak
 
PaperCut Top 10 Reasons
PaperCut Top 10 ReasonsPaperCut Top 10 Reasons
PaperCut Top 10 Reasonsrkoscak
 
Kerio Connect Vs Microsoft Exchange
Kerio Connect Vs Microsoft ExchangeKerio Connect Vs Microsoft Exchange
Kerio Connect Vs Microsoft Exchangerkoscak
 
Kerio Connect 7.4 Datasheet
Kerio Connect 7.4 DatasheetKerio Connect 7.4 Datasheet
Kerio Connect 7.4 Datasheetrkoscak
 
Kerio Operator Overview
Kerio Operator OverviewKerio Operator Overview
Kerio Operator Overviewrkoscak
 
Kerio Connect 7 Overview
Kerio Connect 7 OverviewKerio Connect 7 Overview
Kerio Connect 7 Overviewrkoscak
 

More from rkoscak (8)

PaperCut NG katalog, Hrvatska verzija
PaperCut NG katalog, Hrvatska verzijaPaperCut NG katalog, Hrvatska verzija
PaperCut NG katalog, Hrvatska verzija
 
PaperCut Fact Sheet Overview
PaperCut Fact Sheet OverviewPaperCut Fact Sheet Overview
PaperCut Fact Sheet Overview
 
PaperCut Solutions For Education
PaperCut Solutions For EducationPaperCut Solutions For Education
PaperCut Solutions For Education
 
PaperCut Top 10 Reasons
PaperCut Top 10 ReasonsPaperCut Top 10 Reasons
PaperCut Top 10 Reasons
 
Kerio Connect Vs Microsoft Exchange
Kerio Connect Vs Microsoft ExchangeKerio Connect Vs Microsoft Exchange
Kerio Connect Vs Microsoft Exchange
 
Kerio Connect 7.4 Datasheet
Kerio Connect 7.4 DatasheetKerio Connect 7.4 Datasheet
Kerio Connect 7.4 Datasheet
 
Kerio Operator Overview
Kerio Operator OverviewKerio Operator Overview
Kerio Operator Overview
 
Kerio Connect 7 Overview
Kerio Connect 7 OverviewKerio Connect 7 Overview
Kerio Connect 7 Overview
 

Kerio Control Datasheet Provides Unified Threat Management

  • 1. Datasheet - Kerio Control (embed) | Kerio Page 1 of 2 Datasheet Kerio Control Unified Threat Management and Network Intelligence Feature Feature description Benefit • Transparent mapping of users from Active Directory and Open • Easily configured in a Windows or Mac network Directory. • Enforces network and web access policies tailored to individual User • User-specific access policies. users regardless of the access device used. Management • Forced user authentication for network access. • Administrators and managers can precisely monitor web • User-based network activity reports. behavior of individuals and groups. • Integrated gateway anti-virus, web filter, P2P networks filter, • Protects networks and users from viruses, spyware, drive-by Unified VLAN tagging 802.1Q, intrusion prevention system, file-type downloads, and other malware. Threat blocker, flexible keyword and web object filter. • Protects companies from legal liabilities and helps limit Management productivity losses. • Multiple site-to-site and client-to-site VPN tunnels. • Simplifies VPN deployment for advanced VPN setups. • Includes a cross-platform VPN client for Windows, Mac, and • One-click Kerio VPN Client ensures high-speed secure access VPN Linux. for any user from any computer. • Multi-port active/active and active/passive configurations with • Ensures high-availability of network uptime with optimized automatic connection failover and link load balancing. performance and maximum throughput. Quality of • Bandwidth Management easily reserves and caps bandwidth for • Guarantees bandwidth for critical applications and provides Service specific network traffic types. simple control of network traffic by type, user, group, quota, and more. Awards & Reviews PC Magazine - Editor's Choice Rated: Very Good "I found the software extremely easy to understand and navigate. ...simplest VPN...scale better than competing firewall appliance." -Mario Morejon, PC Magazine SC Magazine Rated: Four out of five stars "Very nice software firewall with anti-virus and web filtering." -Peter Stephenson, SC Magazine CRN - Recommended Rated: Five stars "Every feature that you can need and more." -CRN Integrator, CRN Testimonial "The ease in which Kerio Control can be installed and configured compared to SonicWall is no contest. Kerio Control is an easy recommendation to our clients. They are eager to make the switch." -Nick Hoague and Ray Lund, OnePointSync Monitor employee productivity and web usage statistics with on-demand on-line reports or automated email reports from Kerio Control Statistics. Connect. Communicate. Collaborate. Securely. | 1-888-77-KERIO | www.kerio.com http://www.kerio.com/node/8086 31.10.2012.
  • 2. Datasheet - Kerio Control (embed) | Kerio Page 2 of 2 Everything you like about Kerio Control software, wrapped in performance optimized hardware. Kerio Control Box. Kerio Control Box Hardware Models Kerio Control Box 1110 Kerio Control Box 3110 Software system requirements Users Included 5 users (add-on user licenses available) 5 users (add-on user licenses available) Software Virtual Appliance Appliance Windows Software Kerio Control with Sophos Anti-Virus and Kerio Control Web Filter 500 MHz CPU 2 GHz CPU 1 GHz CPU Features 1 GB RAM 1 GB RAM 1 GB RAM (assigned) Chassis Desktop 1U rack mount 8 GB HDD 8 GB HDD 8 GB HDD Dimensions (in/mm) 10.7 x 7.7 x 1.7 / 272 x 195 x 44 16.8 x 10.7 x 1.7 / 426 x 450 x 44 (assigned) Weight (lbs/kg) 5 / 2.26 15 / 6.8 2 Gigabit NICs 2 NICs (assigned) 2 Gigabit NICs Gigabit Ethernet 4 ports 8 ports OS included OS included Windows 2000/ XP/Vista/7 Power Input 60W 200W VMware Workstation/ Windows Server Compact Flash Disk Industrial Grade 4 GB Industrial Grade 8 GB Server/ESX/ESXi/ 2000/2003/2008 Fusion/Player (32 or 64 bit) Memory 2 GB 2 GB Parallels Desktop/ Processor Intel 1.5 Ghz Intel Dual Core 2.6 Ghz Server for Mac Warranty Standard 1-year warranty Standard 1-year warranty Hyper-V *Hardware models not available in all markets. FLEXIBLE DEPLOYMENT & INTRUSION PREVENTION SYSTEM BANDWIDTH MANAGEMENT & QOS ADMINISTRATION The IPS engine transparently monitors inbound Kerio Control empowers IT admins to fine-tune Whether using a bare metal ISO installation, and outbound network communication to bandwidth management rules to guarantee virtualized infrastructure, or Kerio Control Box identify suspicious activity. Protects servers bandwidth for high-prioritiy network traffic types hardware appliance, all deployments easily scale behind the firewall from unauthorized (like VoIP or video conferencing) and restrict as needs change. With simultaneous support for connections, typically originated by an Internet bandwidth for low-priority network traffic types. IPv4 and IPv6 traffic, organizations can securely bot or hacker trying to exploit an available Create rules by user/group, specific protocol, begin preparations for the inevitable move to service. Daily IPS Blacklist updates provide quick DSCP value, and more. Monitor bandwidth usage IPv6. VLAN support brings greater flexibility response to the rapidly evolving source of with real-time traffic charts. Use multiple when managing large networks. IT admins have threats. Works in tandem with the firewall and connections simultaneously with automatic link complete access to securely configure Kerio content filtering capabilities to prevent malware load balancing and maintain Internet uptime Control from anywhere via a web browser – on the network. with active/passive or active/active failover. even from an iPad. NETWORK ANALYSIS & REPORTING A COMPLETE SECURITY SERVICE Kerio Control Statistics, the built-in statistics Industry certification Kerio Control features integrated Sophos Anti- and reporting module, provides detailed Virus and Kerio Control Web Filter as statistical and graphical reports on employee additional security services for maximum internet usage activity. With access to on- protection. Real-time operation of the integrated demand online reports and automated daily, AV engine allows administrators to specify weekly or monthly email reports, IT and critical web and email protocols to be scanned, business managers can immediately uncover ensuring maximum security against the latest hidden productivity losses, security risks, or viruses, spyware, software vulnerabilities and potential legal liability issues stemming from other malicious code. misuse of IT resources. About Kerio Technologies, Inc. Innovating in Internet security since 1997, Kerio Technologies, Inc. provides unified communications, The Kerio Control Web Filter web content VPN REMOTE ACCESS collaboration and security solutions for small to filtering service blocks 141 categories of web Kerio Control VPN provides unlimited VPN medium sized businesses and organizations that are content that may have an adverse effect on both simple, stable, and secure. tunnels for both site-to-site and client-to-site the productivity and security of the network. scenarios, and offers both persistent and on- Kerio is headquartered in San Jose, California, and Administrators can prevent users from visiting demand modes with cross-platform flexibility. has offices in New York, Germany, the United websites that are known to contain malicious Connect multiple branch offices into a single Kingdom, the Czech Republic, Australia, and Russia. content, including viruses, spyware, Trojans, or manageable network and give remote workers a Kerio has more than 5,000 channel partners who web pages that engage in phishing attacks or support more than 50,000 customers in over 108 reliable secure tunnel with license-less VPN countries. online identity thefts. Kerio Control Web Filter is clients for Windows, Mac and Linux. Scan VPN flexible enough to block users or groups from traffic with integrated anti-virus. Supports © 2012 Kerio Technologies, Inc. All rights reserved. websites or categories during business hours, standard encryption algorithms: SSL for the The names of actual companies and products but can grant access during lunch for example. control channel (TCP) and Blowfish for the data mentioned herein may be the trademarks of their transport (UDP). respective owners. Published 10/2012 Connect. Communicate. Collaborate. Securely. | 1-888-77-KERIO | www.kerio.com http://www.kerio.com/node/8086 31.10.2012.