SlideShare a Scribd company logo
1 of 15
USERGATE
PROXY & FIREWALL
Internet Access Management, Information Security,
Traffic Management and Access Control
INTERNET ACCESS MANAGEMENT
   Internet access management
   Proxy servers for multiple protocols
   Multiple ISP support
   Backup channel support
   Bandwidth management
   Web caching
   IP telephony support
MULTIPLE ISP SUPPORT
BACKUP CHANNEL

Benefits:
 More reliable Internet access
 Different channels can be used for different
   types of traffic
BANDWIDTH MANAGEMENT
 Set specific bandwidth values for different
   protocols and types of traffic
 Control bandwidth for individual users
IP TELEPHONY SUPPORT
 SIP and H.323 support
 Comprehensive phone calls statistics
INFORMATION SECURITY
   Dual antivirus protection
   Firewall
   Integrated NAT driver
   VPN support
DUAL ANTIVIRUS PROTECTION
UserGate installation options:
 Without a virus scanner
 With Kaspersky Antivirus
 With Panda Antivirus
 With two antivirus modules
Functions:

Antivirus modules scan all your http, ftp, pop3
and imap traffic.

Integrated firewall module protects your system
from external intrusions.
MONITORING AND MANAGEMENT FEATURES
   Application control
   URL filtering
   Speed limitations and traffic quotas
   Real-time session monitoring
   Detailed statistics
   Billing
APLICATION CONTROL
Our unique application control module is a valuable add-on to the
standard antivirus protection. Its features include:

 Use Internet access policies (for example, you can deny access from
   older Internet Explorer versions)

 Deny Internet access to applications listed as unwanted in your corporate
   policy (download managers, instant messengers, P2P clients, etc.)

 Monitor applications used by users for Web access
Entensys URL Filtering Module
 Database with over 500 million websites (82 categories)
 All widely spoken language websites classification support




Source: Study of Internet usage by 50,000 employees at over 3,000
companies (performed by Entensys in 2009).
SESSION MONITORING AND STATISTICS
A manager can view:
  Detailed website request statistics for all employees
  Traffic cost information

The following actions may be applied to any user:
  Assign traffic quota
  Set channel bandwidth
  Deny connection via certain protocols
  Determine categories of allowed websites
  Set internet access time for a user
NETWORK ADMINISTRATION

   DHCP support
   Routing
   Resource publishing
   Remote administration
USER-FRIENDLY INTERFACE
UserGate proxy server is
controlled from the administrator
console.



Remotely administration from any
machine in your LAN or from
anywhere in the world via the
Internet.
ADVANTAGES
   Easy to integrate
   Wide range of features
   Use of innovative technologies
   Advanced reliability achieved through partnering with the
    leading vendors in the industry
   Cost efficiency


SOFTWARE PACKAGES
   UserGate Proxy & Firewall
   UserGate + 1 Antivirus module (Kaspersky or Panda)
   UserGate + 2 Antivirus modules (Kaspersky + Panda)
   UserGate + Entensys URL Filtering module
   UserGate + Entensys URL Filtering module + 1 Antivirus module
   UserGate + Entensys URL Filtering module + 2 Antivirus modules
ENTENSYS COMPANY
   Founded in 2001
   Offices in Moscow, Novosibirsk, Leipzig (Germany)
   Staff: more than 40 employees
   More details about the company and other products: http://www.entensys.com/

  STRATEGIC PARTNERS




Kaspersky Lab       Panda               BrightCloud        Commtouch
Russia              Security            USA                Israel
                    Spain

More Related Content

What's hot

8 questions to ask when evaluating a Cloud Access Security Broker
8 questions to ask when evaluating a Cloud Access Security Broker8 questions to ask when evaluating a Cloud Access Security Broker
8 questions to ask when evaluating a Cloud Access Security BrokerBitglass
 
Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014Sophos Benelux
 
SonicWALL Advanced Features
SonicWALL Advanced FeaturesSonicWALL Advanced Features
SonicWALL Advanced FeaturesDavid Perkins
 
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersCisco Security
 
Cloud Access Security Broker (CASB)
Cloud Access Security Broker (CASB) Cloud Access Security Broker (CASB)
Cloud Access Security Broker (CASB) rkulandaivel
 
160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architectureLan & Wan Solutions
 
Microsoft India - Forefront Threat Management Gateway 2010 Case Study
Microsoft India  - Forefront Threat Management Gateway 2010 Case StudyMicrosoft India  - Forefront Threat Management Gateway 2010 Case Study
Microsoft India - Forefront Threat Management Gateway 2010 Case StudyMicrosoft Private Cloud
 
Pro& Contra Next Generation Firewalls
Pro& Contra Next Generation FirewallsPro& Contra Next Generation Firewalls
Pro& Contra Next Generation FirewallsBelsoft
 
Istio Security Overview
Istio Security OverviewIstio Security Overview
Istio Security OverviewMichael Furman
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security BoxSophos
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall PresentationManoj Kumar Mishra
 
Borderware Security Platform
Borderware Security PlatformBorderware Security Platform
Borderware Security Platformcostigaj
 

What's hot (20)

Evento 15 aprile
Evento 15 aprileEvento 15 aprile
Evento 15 aprile
 
CTAP
CTAPCTAP
CTAP
 
8 questions to ask when evaluating a Cloud Access Security Broker
8 questions to ask when evaluating a Cloud Access Security Broker8 questions to ask when evaluating a Cloud Access Security Broker
8 questions to ask when evaluating a Cloud Access Security Broker
 
Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014
 
SonicWALL Advanced Features
SonicWALL Advanced FeaturesSonicWALL Advanced Features
SonicWALL Advanced Features
 
Forti web
Forti webForti web
Forti web
 
Sophos Utm Presentation 2016
Sophos Utm Presentation 2016Sophos Utm Presentation 2016
Sophos Utm Presentation 2016
 
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service Providers
 
Cloud Access Security Broker (CASB)
Cloud Access Security Broker (CASB) Cloud Access Security Broker (CASB)
Cloud Access Security Broker (CASB)
 
160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture
 
Microsoft India - Forefront Threat Management Gateway 2010 Case Study
Microsoft India  - Forefront Threat Management Gateway 2010 Case StudyMicrosoft India  - Forefront Threat Management Gateway 2010 Case Study
Microsoft India - Forefront Threat Management Gateway 2010 Case Study
 
Inside forti os-v524-r5
Inside forti os-v524-r5Inside forti os-v524-r5
Inside forti os-v524-r5
 
Pro& Contra Next Generation Firewalls
Pro& Contra Next Generation FirewallsPro& Contra Next Generation Firewalls
Pro& Contra Next Generation Firewalls
 
Istio Security Overview
Istio Security OverviewIstio Security Overview
Istio Security Overview
 
Web application firewall advanced
Web application firewall advancedWeb application firewall advanced
Web application firewall advanced
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security Box
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
 
FortiWeb
FortiWebFortiWeb
FortiWeb
 
Borderware Security Platform
Borderware Security PlatformBorderware Security Platform
Borderware Security Platform
 
Sandboxing
SandboxingSandboxing
Sandboxing
 

Similar to UserGate Proxy & Firewall

Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoCristian Garcia G.
 
Kaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01aKaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01aIgor Pandzic
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPNAjay Nawani
 
FortiProxy sales presentation-02022020_Vee.pptx
FortiProxy sales presentation-02022020_Vee.pptxFortiProxy sales presentation-02022020_Vee.pptx
FortiProxy sales presentation-02022020_Vee.pptxNuttapolMix
 
Protección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
Protección y acceso a tu información y aplicaciones en Azure y O365 – BarracudaProtección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
Protección y acceso a tu información y aplicaciones en Azure y O365 – BarracudaPlain Concepts
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduseIDG Romania
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bellCisco Canada
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Benelux
 
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINXKeep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINXNGINX, Inc.
 
Acit Mumbai - understanding vpns
Acit Mumbai - understanding vpnsAcit Mumbai - understanding vpns
Acit Mumbai - understanding vpnsSleek International
 
SafeDNS for Networking Hardware Manufacturers and Software Vendors
SafeDNS for Networking Hardware Manufacturers and Software VendorsSafeDNS for Networking Hardware Manufacturers and Software Vendors
SafeDNS for Networking Hardware Manufacturers and Software VendorsSafeDNS
 
Inseptra company product solutions v2 26092014
Inseptra company product solutions v2 26092014Inseptra company product solutions v2 26092014
Inseptra company product solutions v2 26092014Mustafa Kuğu
 
Barracuda Web Filter Ip 20100629
Barracuda Web Filter Ip 20100629Barracuda Web Filter Ip 20100629
Barracuda Web Filter Ip 20100629Carolynrahn
 
12 Understanding V P Ns
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P NsAamirAziz
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A ServiceOlav Tvedt
 
Contextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsContextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsIvanti
 

Similar to UserGate Proxy & Firewall (20)

Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
Kaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01aKaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01a
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
FortiProxy sales presentation-02022020_Vee.pptx
FortiProxy sales presentation-02022020_Vee.pptxFortiProxy sales presentation-02022020_Vee.pptx
FortiProxy sales presentation-02022020_Vee.pptx
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Protección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
Protección y acceso a tu información y aplicaciones en Azure y O365 – BarracudaProtección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
Protección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduse
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bell
 
Forti os ngfw
Forti os ngfwForti os ngfw
Forti os ngfw
 
Windows 7 by microsoft
Windows 7 by microsoft Windows 7 by microsoft
Windows 7 by microsoft
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
 
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINXKeep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
 
Acit Mumbai - understanding vpns
Acit Mumbai - understanding vpnsAcit Mumbai - understanding vpns
Acit Mumbai - understanding vpns
 
SafeDNS for Networking Hardware Manufacturers and Software Vendors
SafeDNS for Networking Hardware Manufacturers and Software VendorsSafeDNS for Networking Hardware Manufacturers and Software Vendors
SafeDNS for Networking Hardware Manufacturers and Software Vendors
 
Inseptra company product solutions v2 26092014
Inseptra company product solutions v2 26092014Inseptra company product solutions v2 26092014
Inseptra company product solutions v2 26092014
 
Barracuda Web Filter Ip 20100629
Barracuda Web Filter Ip 20100629Barracuda Web Filter Ip 20100629
Barracuda Web Filter Ip 20100629
 
12 Understanding V P Ns
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P Ns
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Contextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsContextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized Desktops
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

UserGate Proxy & Firewall

  • 1. USERGATE PROXY & FIREWALL Internet Access Management, Information Security, Traffic Management and Access Control
  • 2. INTERNET ACCESS MANAGEMENT  Internet access management  Proxy servers for multiple protocols  Multiple ISP support  Backup channel support  Bandwidth management  Web caching  IP telephony support
  • 3. MULTIPLE ISP SUPPORT BACKUP CHANNEL Benefits:  More reliable Internet access  Different channels can be used for different types of traffic
  • 4. BANDWIDTH MANAGEMENT  Set specific bandwidth values for different protocols and types of traffic  Control bandwidth for individual users
  • 5. IP TELEPHONY SUPPORT  SIP and H.323 support  Comprehensive phone calls statistics
  • 6. INFORMATION SECURITY  Dual antivirus protection  Firewall  Integrated NAT driver  VPN support
  • 7. DUAL ANTIVIRUS PROTECTION UserGate installation options:  Without a virus scanner  With Kaspersky Antivirus  With Panda Antivirus  With two antivirus modules Functions: Antivirus modules scan all your http, ftp, pop3 and imap traffic. Integrated firewall module protects your system from external intrusions.
  • 8. MONITORING AND MANAGEMENT FEATURES  Application control  URL filtering  Speed limitations and traffic quotas  Real-time session monitoring  Detailed statistics  Billing
  • 9. APLICATION CONTROL Our unique application control module is a valuable add-on to the standard antivirus protection. Its features include:  Use Internet access policies (for example, you can deny access from older Internet Explorer versions)  Deny Internet access to applications listed as unwanted in your corporate policy (download managers, instant messengers, P2P clients, etc.)  Monitor applications used by users for Web access
  • 10. Entensys URL Filtering Module  Database with over 500 million websites (82 categories)  All widely spoken language websites classification support Source: Study of Internet usage by 50,000 employees at over 3,000 companies (performed by Entensys in 2009).
  • 11. SESSION MONITORING AND STATISTICS A manager can view:  Detailed website request statistics for all employees  Traffic cost information The following actions may be applied to any user:  Assign traffic quota  Set channel bandwidth  Deny connection via certain protocols  Determine categories of allowed websites  Set internet access time for a user
  • 12. NETWORK ADMINISTRATION  DHCP support  Routing  Resource publishing  Remote administration
  • 13. USER-FRIENDLY INTERFACE UserGate proxy server is controlled from the administrator console. Remotely administration from any machine in your LAN or from anywhere in the world via the Internet.
  • 14. ADVANTAGES  Easy to integrate  Wide range of features  Use of innovative technologies  Advanced reliability achieved through partnering with the leading vendors in the industry  Cost efficiency SOFTWARE PACKAGES  UserGate Proxy & Firewall  UserGate + 1 Antivirus module (Kaspersky or Panda)  UserGate + 2 Antivirus modules (Kaspersky + Panda)  UserGate + Entensys URL Filtering module  UserGate + Entensys URL Filtering module + 1 Antivirus module  UserGate + Entensys URL Filtering module + 2 Antivirus modules
  • 15. ENTENSYS COMPANY  Founded in 2001  Offices in Moscow, Novosibirsk, Leipzig (Germany)  Staff: more than 40 employees  More details about the company and other products: http://www.entensys.com/ STRATEGIC PARTNERS Kaspersky Lab Panda BrightCloud Commtouch Russia Security USA Israel Spain

Editor's Notes

  1. As seen on the chart, UGPF - this is a complex solution to manage shared Internet access on a local network, to monitor traffic and protect the corporate LAN from external threats. The solution is multifunctional /as listed on the slide/. We will review several of these functions in more detail.
  2. Working with several providers permits the economical distribution of Internet resources. For example, a high-speed SAT line is assigned to the director, and employees receive a less expensive and slower one. In today's contemporary society, all of an employee's activity is directly tied to the Internet. That is why it is important that no work downtime occurs in the company as a result of the network being down. Thanks to the backup channel, the problem is easily resolved. When the Internet is not available on the primary channel, unknown to the user, the Internet is reconnected to the backup channel.
  3. The next important function is management of the bandwidth for individual users, as well as for protocols and different types of traffic. This function permits the convenient and streamlined distribution of bandwidth for Internet users. For example, to conduct an online conference an employee may increase bandwidth, and accordingly, employees using only e-mail may decrease bandwidth.
  4. IP-Telephony lessens the burden on landlines. This is especially relevant in companies where employees make a large number of calls as part of their work.
  5. UserGate applies a multidimensional approach to LAN security and utilizes the most modern methods to combat Internet-based threats such as viruses, malware and hacker intrusions. The integrated firewall provides additional protection from attacks against the network and other type of intrusions.The integrated NAT driver permits the full utilization of the product. UserGate Proxy & Firewall support "tunnel" or pathway protocols, thereby permitting the use of VPN to securely connect remote branches, offices, banks, etc. In the line's upcoming Version 6, an integrated VPN server will be provided, which will be able to not only allow and support tunneling, but will be able to imitate a VPN connection.
  6. It is important for any company director to know how the Internet is being used, how work time is being used, how it is all being balanced, etc. Thanks to complete monitoring and review of statistical data, it is easy for a supervisor to assess a situation and make correct decisions.
  7. Additional monitoring and protection for the company is provided by a Filter Sites by Category Module, which is based on Entensys URL Filtering Technology. This technology uses an enormous database, more than 500 million sites that are divided into 82 categories. The advantages of this database are:- the responsiveness of the database, that is to say the content of the sites is continuously rechecked by robots and people for subject content that is related to the required categories;- daily update of the database;- it contains a large number of poorly reputed sites.According to studies, it has been determined that employees in a company utilize the Internet 42% of the time for unauthorized purposes.Firstly, this lowers employees' performance; secondly there is a great probability of malware or viruses being introduced into the system.Therefore, it is necessary to understand the importance of monitoring and managing Internet access.
  8. /Slide for administrators/With the aid of UserGate, one may execute several routine operations that allow one to simplify their network administration.For example, the internal Dynamic Host Configuration Protocol (DHCP)-server automates the IP-address selection process by computers and other devices in the LAN (it is not required to manually type the address).If a computer with UserGate is connected to several LANs, UserGate server may be set up as a router, ensuring transparent and bidirectional communication between LANs.The publication of resources grants access to internal company resources such as the Web, FTP, VPN or to the mail server. And finally, remote administration allows for remote connection to the LAN via the Internet from any computer on which the UserGate Administrator Console has been installed.