www.Seqrite.com 1
Enterprise Security
Solutions by
www.Seqrite.com 2
Webinar by: Rohit Waghmare
Pre - Sales Consultant: Gateway Security
rohit.waghmare@seqrite.com
www.Seqrite.com 3
Agenda
• What is Gateway Level Protection?
 What is Firewall?
 What is the need of Unified Management?
 What is UTM?
 Difference between UTM & Firewall
• Why you should switch to UTM-Gateway Level Protection
• Features and advantages offered by UTM.
• How Seqrite-Terminator helps to attain highest Safety, management and security
www.Seqrite.com
2016 - Average Day - Enterprise Attacks
www.Seqrite.com 5
Risk in Unprotected Network
• Cyber Attacks
• Hacking
• Spyware
• Virus
• Worms
• Trojan Horses
• Phishing
• Ransomeware attacks
• Unauthorized Usage
• Modification or Deletion of
Files
• Keystroke Loggings
• Malicious Attacks
• Adware
www.Seqrite.com 6
Basic function of a firewall
• A firewall is a network security system that
monitors & controls the incoming outgoing
network.
• A firewall typically establishes a barrier
between a trusted secured internet network
and another network.
• This can be software based , hardware
based or both software & hardware.
www.Seqrite.com 7
• Powrful Primary Shield
• All in one Solution
• User Friendly & Simple
• Only one Hardware
• ISP Load Balancing
• Faster Computation
• Secured VPN
• Comprehensive
Logging & Reporting
www.Seqrite.com 8
Evolution of UTM
Traditional Firewall NGFW UTM
• FIREWALL • FIREWALL
• APPLICATION
CONTROL
• IPS
• FIREWALL
• APPLICATION CONTROL
• IPS
• BANDWITH & QUOTA MANAGEMENT
• CONTENT FILTERING
• LOAD BALANCING & AUTO-LINK FAILURE
• VPN
• MAIL PROTECTION
• ANTI-VIRUS
www.Seqrite.com
IT CHALLENGES FOR ENTERPRISE
9
www.Seqrite.com
SEQRITE TERMINATOR
10
www.Seqrite.com 11
How UTM Protects you
NETWORKING
• ISP Load Balancing
• Policy Based Routing
• Automatic Gateway Failover
• DNS & DHCP Server
• USB Internet Support 3G/4G
• IP & Port Forwarding
• Configurable LAN/WAN/DMZ
ports
• Link Aggregation
C0NTENT FILTERING
• Category Based
• Custom Web List
• http & https blocking
• Bandwidth limit for each
profile/user
• Time based access limit
• Bandwidth Management
• Data Quota Management
• Key Word Blocking
www.Seqrite.com 12
How UTM Protects you
FIREWALL & SECURITY
• FIREWALL
a)Traffic Logging
b)Predefined Firewall Rule
c)Zone Support
• Stateful Inspection
• Instrusion Prevention System
• Gateway Antivirus
MAIL PROTECTION
• Mail Antivirus & Anti-Spam
(SMTP,POP3 & IMAP)
• Attachment Control
• Keyword Blocking in email
www.Seqrite.com 13
How UTM Protects you
MONITORING & REPORTS
• Daily, weekly and Monthly
Report
• Log Viewer
• Alerts ( Email and SMS )
• Internal Services Usage
VPN
• IPSec
• PPTP
• SSL VPN
USER AUTHENTICATION
• Internal Database
• AD integration
• IP/MAC binding
• LDAP Integration
• Guest User support
ADMINISTRATION
• Web Portal Customization
• Backup & Restore Configuration
• Administrative Profile
Managent
• Multiple Administrative
Support
www.Seqrite.com 14
Ease of Management
Group Creation
www.Seqrite.com 15
Ease of Reports
Policy Breach Report
www.Seqrite.com 16
Seqrite Terminator UTM Models
Terminator Models T2S-10 T2S-30 T2S-60 T2M-100 T2M-250
Hardware ID T2S10 1035/1035S 3675 T2M100 T2M250
H/W Specs
CPU AMD AMD AMD AMD Intel
Speed 1.0 GHz 1.0 GHz 1.6 GHz 2.3GHz 3.50 GHz
# of cores 2 2 4 4 2
Cache per core 1 MB 1 MB 2 MB 4 MB 4 MB
RAM 1GB DDR3 2GB DDR3 2GB DDR3 4GB DDR3 4GB DDR3
Storage 16GB SSD
16GB MLC CF / 32
GB SSD
64GB SSD 128 GB SSD 240 GB SSD
Copper GbE ports 3 4 6 8 10
Console port 1 1 1 1 1
USB Ports 2 2 2 2 2
www.Seqrite.com 17
Thank You
• Call us at: 020-66813139
• Write to us at: utmsales@seqrite.com
• Visit us at: www.seqrite.com
No Matter how small or big you
network .
TERMINATOR is one point Powerful
security Solution

Next-Gen Security Solution: Gateway Protection

  • 1.
  • 2.
    www.Seqrite.com 2 Webinar by:Rohit Waghmare Pre - Sales Consultant: Gateway Security rohit.waghmare@seqrite.com
  • 3.
    www.Seqrite.com 3 Agenda • Whatis Gateway Level Protection?  What is Firewall?  What is the need of Unified Management?  What is UTM?  Difference between UTM & Firewall • Why you should switch to UTM-Gateway Level Protection • Features and advantages offered by UTM. • How Seqrite-Terminator helps to attain highest Safety, management and security
  • 4.
    www.Seqrite.com 2016 - AverageDay - Enterprise Attacks
  • 5.
    www.Seqrite.com 5 Risk inUnprotected Network • Cyber Attacks • Hacking • Spyware • Virus • Worms • Trojan Horses • Phishing • Ransomeware attacks • Unauthorized Usage • Modification or Deletion of Files • Keystroke Loggings • Malicious Attacks • Adware
  • 6.
    www.Seqrite.com 6 Basic functionof a firewall • A firewall is a network security system that monitors & controls the incoming outgoing network. • A firewall typically establishes a barrier between a trusted secured internet network and another network. • This can be software based , hardware based or both software & hardware.
  • 7.
    www.Seqrite.com 7 • PowrfulPrimary Shield • All in one Solution • User Friendly & Simple • Only one Hardware • ISP Load Balancing • Faster Computation • Secured VPN • Comprehensive Logging & Reporting
  • 8.
    www.Seqrite.com 8 Evolution ofUTM Traditional Firewall NGFW UTM • FIREWALL • FIREWALL • APPLICATION CONTROL • IPS • FIREWALL • APPLICATION CONTROL • IPS • BANDWITH & QUOTA MANAGEMENT • CONTENT FILTERING • LOAD BALANCING & AUTO-LINK FAILURE • VPN • MAIL PROTECTION • ANTI-VIRUS
  • 9.
  • 10.
  • 11.
    www.Seqrite.com 11 How UTMProtects you NETWORKING • ISP Load Balancing • Policy Based Routing • Automatic Gateway Failover • DNS & DHCP Server • USB Internet Support 3G/4G • IP & Port Forwarding • Configurable LAN/WAN/DMZ ports • Link Aggregation C0NTENT FILTERING • Category Based • Custom Web List • http & https blocking • Bandwidth limit for each profile/user • Time based access limit • Bandwidth Management • Data Quota Management • Key Word Blocking
  • 12.
    www.Seqrite.com 12 How UTMProtects you FIREWALL & SECURITY • FIREWALL a)Traffic Logging b)Predefined Firewall Rule c)Zone Support • Stateful Inspection • Instrusion Prevention System • Gateway Antivirus MAIL PROTECTION • Mail Antivirus & Anti-Spam (SMTP,POP3 & IMAP) • Attachment Control • Keyword Blocking in email
  • 13.
    www.Seqrite.com 13 How UTMProtects you MONITORING & REPORTS • Daily, weekly and Monthly Report • Log Viewer • Alerts ( Email and SMS ) • Internal Services Usage VPN • IPSec • PPTP • SSL VPN USER AUTHENTICATION • Internal Database • AD integration • IP/MAC binding • LDAP Integration • Guest User support ADMINISTRATION • Web Portal Customization • Backup & Restore Configuration • Administrative Profile Managent • Multiple Administrative Support
  • 14.
    www.Seqrite.com 14 Ease ofManagement Group Creation
  • 15.
    www.Seqrite.com 15 Ease ofReports Policy Breach Report
  • 16.
    www.Seqrite.com 16 Seqrite TerminatorUTM Models Terminator Models T2S-10 T2S-30 T2S-60 T2M-100 T2M-250 Hardware ID T2S10 1035/1035S 3675 T2M100 T2M250 H/W Specs CPU AMD AMD AMD AMD Intel Speed 1.0 GHz 1.0 GHz 1.6 GHz 2.3GHz 3.50 GHz # of cores 2 2 4 4 2 Cache per core 1 MB 1 MB 2 MB 4 MB 4 MB RAM 1GB DDR3 2GB DDR3 2GB DDR3 4GB DDR3 4GB DDR3 Storage 16GB SSD 16GB MLC CF / 32 GB SSD 64GB SSD 128 GB SSD 240 GB SSD Copper GbE ports 3 4 6 8 10 Console port 1 1 1 1 1 USB Ports 2 2 2 2 2
  • 17.
    www.Seqrite.com 17 Thank You •Call us at: 020-66813139 • Write to us at: utmsales@seqrite.com • Visit us at: www.seqrite.com No Matter how small or big you network . TERMINATOR is one point Powerful security Solution