SlideShare a Scribd company logo
1 of 17
www.Seqrite.com 1
Enterprise Security
Solutions by
www.Seqrite.com 2
Webinar by: Rohit Waghmare
Pre - Sales Consultant: Gateway Security
rohit.waghmare@seqrite.com
www.Seqrite.com 3
Agenda
• What is Gateway Level Protection?
 What is Firewall?
 What is the need of Unified Management?
 What is UTM?
 Difference between UTM & Firewall
• Why you should switch to UTM-Gateway Level Protection
• Features and advantages offered by UTM.
• How Seqrite-Terminator helps to attain highest Safety, management and security
www.Seqrite.com
2016 - Average Day - Enterprise Attacks
www.Seqrite.com 5
Risk in Unprotected Network
• Cyber Attacks
• Hacking
• Spyware
• Virus
• Worms
• Trojan Horses
• Phishing
• Ransomeware attacks
• Unauthorized Usage
• Modification or Deletion of
Files
• Keystroke Loggings
• Malicious Attacks
• Adware
www.Seqrite.com 6
Basic function of a firewall
• A firewall is a network security system that
monitors & controls the incoming outgoing
network.
• A firewall typically establishes a barrier
between a trusted secured internet network
and another network.
• This can be software based , hardware
based or both software & hardware.
www.Seqrite.com 7
• Powrful Primary Shield
• All in one Solution
• User Friendly & Simple
• Only one Hardware
• ISP Load Balancing
• Faster Computation
• Secured VPN
• Comprehensive
Logging & Reporting
www.Seqrite.com 8
Evolution of UTM
Traditional Firewall NGFW UTM
• FIREWALL • FIREWALL
• APPLICATION
CONTROL
• IPS
• FIREWALL
• APPLICATION CONTROL
• IPS
• BANDWITH & QUOTA MANAGEMENT
• CONTENT FILTERING
• LOAD BALANCING & AUTO-LINK FAILURE
• VPN
• MAIL PROTECTION
• ANTI-VIRUS
www.Seqrite.com
IT CHALLENGES FOR ENTERPRISE
9
www.Seqrite.com
SEQRITE TERMINATOR
10
www.Seqrite.com 11
How UTM Protects you
NETWORKING
• ISP Load Balancing
• Policy Based Routing
• Automatic Gateway Failover
• DNS & DHCP Server
• USB Internet Support 3G/4G
• IP & Port Forwarding
• Configurable LAN/WAN/DMZ
ports
• Link Aggregation
C0NTENT FILTERING
• Category Based
• Custom Web List
• http & https blocking
• Bandwidth limit for each
profile/user
• Time based access limit
• Bandwidth Management
• Data Quota Management
• Key Word Blocking
www.Seqrite.com 12
How UTM Protects you
FIREWALL & SECURITY
• FIREWALL
a)Traffic Logging
b)Predefined Firewall Rule
c)Zone Support
• Stateful Inspection
• Instrusion Prevention System
• Gateway Antivirus
MAIL PROTECTION
• Mail Antivirus & Anti-Spam
(SMTP,POP3 & IMAP)
• Attachment Control
• Keyword Blocking in email
www.Seqrite.com 13
How UTM Protects you
MONITORING & REPORTS
• Daily, weekly and Monthly
Report
• Log Viewer
• Alerts ( Email and SMS )
• Internal Services Usage
VPN
• IPSec
• PPTP
• SSL VPN
USER AUTHENTICATION
• Internal Database
• AD integration
• IP/MAC binding
• LDAP Integration
• Guest User support
ADMINISTRATION
• Web Portal Customization
• Backup & Restore Configuration
• Administrative Profile
Managent
• Multiple Administrative
Support
www.Seqrite.com 14
Ease of Management
Group Creation
www.Seqrite.com 15
Ease of Reports
Policy Breach Report
www.Seqrite.com 16
Seqrite Terminator UTM Models
Terminator Models T2S-10 T2S-30 T2S-60 T2M-100 T2M-250
Hardware ID T2S10 1035/1035S 3675 T2M100 T2M250
H/W Specs
CPU AMD AMD AMD AMD Intel
Speed 1.0 GHz 1.0 GHz 1.6 GHz 2.3GHz 3.50 GHz
# of cores 2 2 4 4 2
Cache per core 1 MB 1 MB 2 MB 4 MB 4 MB
RAM 1GB DDR3 2GB DDR3 2GB DDR3 4GB DDR3 4GB DDR3
Storage 16GB SSD
16GB MLC CF / 32
GB SSD
64GB SSD 128 GB SSD 240 GB SSD
Copper GbE ports 3 4 6 8 10
Console port 1 1 1 1 1
USB Ports 2 2 2 2 2
www.Seqrite.com 17
Thank You
• Call us at: 020-66813139
• Write to us at: utmsales@seqrite.com
• Visit us at: www.seqrite.com
No Matter how small or big you
network .
TERMINATOR is one point Powerful
security Solution

More Related Content

What's hot

What's hot (20)

Take the Ransom Out of Ransomware
Take the Ransom Out of RansomwareTake the Ransom Out of Ransomware
Take the Ransom Out of Ransomware
 
Cambodia CERT Seminar: Incident response for ransomeware attacks
Cambodia CERT Seminar: Incident response for ransomeware attacksCambodia CERT Seminar: Incident response for ransomeware attacks
Cambodia CERT Seminar: Incident response for ransomeware attacks
 
The Nitty Gritty of Website Security
The Nitty Gritty of Website SecurityThe Nitty Gritty of Website Security
The Nitty Gritty of Website Security
 
How Malware Works
How Malware WorksHow Malware Works
How Malware Works
 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla Isolation
 
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
 New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
 
How to Detect System Compromise & Data Exfiltration with AlienVault USM
How to Detect System Compromise & Data Exfiltration with AlienVault USMHow to Detect System Compromise & Data Exfiltration with AlienVault USM
How to Detect System Compromise & Data Exfiltration with AlienVault USM
 
Cloud Security Introduction
Cloud Security IntroductionCloud Security Introduction
Cloud Security Introduction
 
The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?
 
Alienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworksAlienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworks
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?
 
Integrated Tools in OSSIM
Integrated Tools in OSSIMIntegrated Tools in OSSIM
Integrated Tools in OSSIM
 
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USM
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
Database security for PHP
Database security for PHPDatabase security for PHP
Database security for PHP
 
How to Detect SQL Injections & XSS Attacks with AlienVault USM
How to Detect SQL Injections & XSS Attacks with AlienVault USM How to Detect SQL Injections & XSS Attacks with AlienVault USM
How to Detect SQL Injections & XSS Attacks with AlienVault USM
 
Cyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeCyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat Landscape
 

Similar to Next-Gen Security Solution: Gateway Protection

Similar to Next-Gen Security Solution: Gateway Protection (20)

Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
 
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics
 
HIPAA 101 Compliance Threat Landscape & Best Practices
HIPAA 101 Compliance Threat Landscape & Best PracticesHIPAA 101 Compliance Threat Landscape & Best Practices
HIPAA 101 Compliance Threat Landscape & Best Practices
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
 
Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation Firewall
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
Cloud monitoring - An essential Platform Service
Cloud monitoring  - An essential Platform ServiceCloud monitoring  - An essential Platform Service
Cloud monitoring - An essential Platform Service
 
Network Design and Security Best Practices
Network Design and Security Best PracticesNetwork Design and Security Best Practices
Network Design and Security Best Practices
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
 
Security On The Cloud
Security On The CloudSecurity On The Cloud
Security On The Cloud
 
Sophos XG Firewall
Sophos XG FirewallSophos XG Firewall
Sophos XG Firewall
 
Fortigate class1
Fortigate class1Fortigate class1
Fortigate class1
 
The 7 Steps to a Successful Cyberattack: How to Defend Against Them
The 7 Steps to a Successful Cyberattack: How to Defend Against ThemThe 7 Steps to a Successful Cyberattack: How to Defend Against Them
The 7 Steps to a Successful Cyberattack: How to Defend Against Them
 
Security chapter6
Security chapter6Security chapter6
Security chapter6
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
 
Firewall Management: What Is It?
Firewall Management: What Is It?Firewall Management: What Is It?
Firewall Management: What Is It?
 
Fortigate Training
Fortigate TrainingFortigate Training
Fortigate Training
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
 
Panda Security - Gatedefender
Panda Security - GatedefenderPanda Security - Gatedefender
Panda Security - Gatedefender
 

More from Quick Heal Technologies Ltd.

More from Quick Heal Technologies Ltd. (20)

Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 
GITEX 2016, Dubai
GITEX 2016, Dubai GITEX 2016, Dubai
GITEX 2016, Dubai
 
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
 
Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016
 
Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016 Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016
 
Seqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, IndiaSeqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, India
 
Fonetastic ppt
Fonetastic pptFonetastic ppt
Fonetastic ppt
 
Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.
 
BFSI Leadership Summit, Mumbai
BFSI Leadership Summit, MumbaiBFSI Leadership Summit, Mumbai
BFSI Leadership Summit, Mumbai
 
Jnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher education
 
Event S-Mart Milan, Italy - May 2016
Event S-Mart Milan, Italy - May 2016Event S-Mart Milan, Italy - May 2016
Event S-Mart Milan, Italy - May 2016
 
Event S-Mart 2016 Florence, Italy - April 2016
Event S-Mart 2016 Florence, Italy - April 2016Event S-Mart 2016 Florence, Italy - April 2016
Event S-Mart 2016 Florence, Italy - April 2016
 
25th Japan IT Week 2016
25th Japan IT Week 201625th Japan IT Week 2016
25th Japan IT Week 2016
 
Cyber Security Predictions 2016
Cyber Security Predictions 2016Cyber Security Predictions 2016
Cyber Security Predictions 2016
 

Recently uploaded

Recently uploaded (20)

WSO2Con2024 - Facilitating Broadband Switching Services for UK Telecoms Provi...
WSO2Con2024 - Facilitating Broadband Switching Services for UK Telecoms Provi...WSO2Con2024 - Facilitating Broadband Switching Services for UK Telecoms Provi...
WSO2Con2024 - Facilitating Broadband Switching Services for UK Telecoms Provi...
 
WSO2Con2024 - Organization Management: The Revolution in B2B CIAM
WSO2Con2024 - Organization Management: The Revolution in B2B CIAMWSO2Con2024 - Organization Management: The Revolution in B2B CIAM
WSO2Con2024 - Organization Management: The Revolution in B2B CIAM
 
AzureNativeQumulo_HPC_Cloud_Native_Benchmarks.pdf
AzureNativeQumulo_HPC_Cloud_Native_Benchmarks.pdfAzureNativeQumulo_HPC_Cloud_Native_Benchmarks.pdf
AzureNativeQumulo_HPC_Cloud_Native_Benchmarks.pdf
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - Keynote
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...
WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...
WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AI
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public AdministrationWSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 

Next-Gen Security Solution: Gateway Protection

  • 2. www.Seqrite.com 2 Webinar by: Rohit Waghmare Pre - Sales Consultant: Gateway Security rohit.waghmare@seqrite.com
  • 3. www.Seqrite.com 3 Agenda • What is Gateway Level Protection?  What is Firewall?  What is the need of Unified Management?  What is UTM?  Difference between UTM & Firewall • Why you should switch to UTM-Gateway Level Protection • Features and advantages offered by UTM. • How Seqrite-Terminator helps to attain highest Safety, management and security
  • 4. www.Seqrite.com 2016 - Average Day - Enterprise Attacks
  • 5. www.Seqrite.com 5 Risk in Unprotected Network • Cyber Attacks • Hacking • Spyware • Virus • Worms • Trojan Horses • Phishing • Ransomeware attacks • Unauthorized Usage • Modification or Deletion of Files • Keystroke Loggings • Malicious Attacks • Adware
  • 6. www.Seqrite.com 6 Basic function of a firewall • A firewall is a network security system that monitors & controls the incoming outgoing network. • A firewall typically establishes a barrier between a trusted secured internet network and another network. • This can be software based , hardware based or both software & hardware.
  • 7. www.Seqrite.com 7 • Powrful Primary Shield • All in one Solution • User Friendly & Simple • Only one Hardware • ISP Load Balancing • Faster Computation • Secured VPN • Comprehensive Logging & Reporting
  • 8. www.Seqrite.com 8 Evolution of UTM Traditional Firewall NGFW UTM • FIREWALL • FIREWALL • APPLICATION CONTROL • IPS • FIREWALL • APPLICATION CONTROL • IPS • BANDWITH & QUOTA MANAGEMENT • CONTENT FILTERING • LOAD BALANCING & AUTO-LINK FAILURE • VPN • MAIL PROTECTION • ANTI-VIRUS
  • 11. www.Seqrite.com 11 How UTM Protects you NETWORKING • ISP Load Balancing • Policy Based Routing • Automatic Gateway Failover • DNS & DHCP Server • USB Internet Support 3G/4G • IP & Port Forwarding • Configurable LAN/WAN/DMZ ports • Link Aggregation C0NTENT FILTERING • Category Based • Custom Web List • http & https blocking • Bandwidth limit for each profile/user • Time based access limit • Bandwidth Management • Data Quota Management • Key Word Blocking
  • 12. www.Seqrite.com 12 How UTM Protects you FIREWALL & SECURITY • FIREWALL a)Traffic Logging b)Predefined Firewall Rule c)Zone Support • Stateful Inspection • Instrusion Prevention System • Gateway Antivirus MAIL PROTECTION • Mail Antivirus & Anti-Spam (SMTP,POP3 & IMAP) • Attachment Control • Keyword Blocking in email
  • 13. www.Seqrite.com 13 How UTM Protects you MONITORING & REPORTS • Daily, weekly and Monthly Report • Log Viewer • Alerts ( Email and SMS ) • Internal Services Usage VPN • IPSec • PPTP • SSL VPN USER AUTHENTICATION • Internal Database • AD integration • IP/MAC binding • LDAP Integration • Guest User support ADMINISTRATION • Web Portal Customization • Backup & Restore Configuration • Administrative Profile Managent • Multiple Administrative Support
  • 14. www.Seqrite.com 14 Ease of Management Group Creation
  • 15. www.Seqrite.com 15 Ease of Reports Policy Breach Report
  • 16. www.Seqrite.com 16 Seqrite Terminator UTM Models Terminator Models T2S-10 T2S-30 T2S-60 T2M-100 T2M-250 Hardware ID T2S10 1035/1035S 3675 T2M100 T2M250 H/W Specs CPU AMD AMD AMD AMD Intel Speed 1.0 GHz 1.0 GHz 1.6 GHz 2.3GHz 3.50 GHz # of cores 2 2 4 4 2 Cache per core 1 MB 1 MB 2 MB 4 MB 4 MB RAM 1GB DDR3 2GB DDR3 2GB DDR3 4GB DDR3 4GB DDR3 Storage 16GB SSD 16GB MLC CF / 32 GB SSD 64GB SSD 128 GB SSD 240 GB SSD Copper GbE ports 3 4 6 8 10 Console port 1 1 1 1 1 USB Ports 2 2 2 2 2
  • 17. www.Seqrite.com 17 Thank You • Call us at: 020-66813139 • Write to us at: utmsales@seqrite.com • Visit us at: www.seqrite.com No Matter how small or big you network . TERMINATOR is one point Powerful security Solution