SlideShare a Scribd company logo
ShareTech
Next-Gen UTM
UR Series
Here comes your footer Page 2
ShareTech Next-Gen UTM
Common network intrusion methods
Network
Auth.
Auditing
Gateway
Security
Hacking
Prevention
Network
Query
Identity
Intrusion
Prevention
QoS Encrypted
Connection
Security
Audit
Layer 7 APP
Control
Virus Filters
Intrusion,
Sniffer, illegal
connection
DHCP
MAC, IP
Layer 2, ICMP,
TCP
UDP Anomaly
VoIP
P2P
SSL VPN SOX
HIPPA
IM
P2P
URL
SMTP/POP3
Http
FTP
ShareTech Information Co., Ltd.
Here comes your footer
BeforeBefore NowNow
Page 3
ShareTech Next-Gen UTM
Competitive Advantages for SME
QoS
Anti-Spam
Load
Balance
Anti-Virus
ShareTech Information Co., Ltd.
Here comes your footer Page 4Page 4
ShareTech Next-Gen UTM
Solve Your Network Problems
ShareTech Information Co., Ltd.
Here comes your footer Page 5
About ShareTech Information Co., Ltd.
Company Profile
Founded
In 1999
Early Stage

Small Device Agent
(Modem/IP Router)

System integration
Developing Stage

OEM
First hardware-based Mail Server in 2004

Software Development
Firewall Flow Analysis, Watchlan…
2000-20101999-2000 2014-
Present Stage

More than 50% employees is RD

Mail Server

UTM/ Wireless UTM

WF Solution (+AP)
ShareTech Information Co., Ltd.
Here comes your footer Page 6
Our Vision
ShareTech Next-Gen UTM Four Major Features
ShareTech Next-Gen UTM Product Series and Spec
Service and Support
Success Stories
ShareTech Information Co., Ltd.
Becoming Our Agent
What you need to know before getting starteded
Here comes your footer Page 7
Target Markets
Strategy
Becoming Our Agent
Our Vision - Becoming a leading Network Security Brand
SOHO
SME
Middle
Business
Government
Organization
Schools
Financial
Teleservice
Business Rental
Sound Management
Online behavior, APP,
QoS control
Complete Online
Behavior Record
AP Management
Secure wired & wireless
network
Internal Co-Defense
Integrated with Switch
Cloud CMS
Make sure each spot
functioned well
ShareTech Information Co., Ltd.
Here comes your footer Page 8
ShareTech Next-Gen UTM
Four Major Features
Security Protection
Easy ManagementRecord-based Monitoring
Internal Control
 Anti-Virus, Anti-Spyware, Anti-
Phishing, Anti-DoS, Anti-Hacking and
Anti-Relay
 IDP & Botnet
 Co-Defense
 Policy Control (QoS/VPN/Auth.)
 Filter APP
 Content Filter
 Mail Audit
 Network Load Balancing
 Incoming/Outgoing mail record
 IM record
 FTP download record
 Encrypted SKEYP & QQ record
 Event log
 Webpage Management
 CMS
 AP Control
 Bulletin Board
 Flow Reports
ShareTech Information Co., Ltd.
Here comes your footer Page 9
ShareTech Next-Gen UTM
Security Protection - IPv4/v6 Dual Stack
ShareTech Information Co., Ltd.
ShareTech Next-Gen UTM IPv6 Certification
Some parts of the world have already exhausted their IPv4 allocations.
ShareTech UTM supports IPv4-only, IPv6-only, and dual-stack for each host.
UR Series have been certificated with “IPv6 Ready” logo by the IPv6 forum.
Here comes your footer Page 10
ShareTech Next-Gen UTM
Security Protection - Anti-Virus
ShareTech Information Co., Ltd.
 ShareTech Next-Gen UTM firewall provides advanced threat protection such
as anti-virus gateway and anti-spam gateway. With network security in
place, Web and email pass through multiple threat detection engines.
Security problems can be detected in real time.
 Automatic Anti-Virus Signature Update: email viruses spread quickly
through the network. ShareTech uses Clam AV that can be efficient in
providing real-time protection to eliminates viruses, spyware, and other
malware.
 Viruses embedded within incoming and outgoing mail,
www., and FTP will be discovered and blocked by virus scanning.
Here comes your footer Page 11ShareTech Information Co., Ltd.
ShareTech Next-Gen UTM
Security Protection - IDP (Instrusion Detection Prevention)
 Signatures :
Default (2243), Custom
 IDP Policies:
Multiple, Custom
 Deep Packet Inspection:
inspect the packets from
OSI layer 4 - 7 (app layer)
 Protocol Anomaly Detection
 Risk management:
3 levels (High, Medium, Low)
Here comes your footer Page 12ShareTech Information Co., Ltd.
ShareTech Next-Gen UTM
Security Protection - BotNet
 “BotNet” (known as Zombie Network). A bot can be left for future activation,
typically runs hidden and uses IRC to communicate with its Command and
Control (C&C) server.
 When a command is released from the
"controller", your computer performs
automated tasks over the Internet.
Being a vulnerable server, it will send
spam distribution to many computers.
 ShareTech UTM integrated with
BotNet with in-built NAT which can
explicitly point out the real attack
running hidden and suspense
malicious software spreading in the
internal network.
Here comes your footer Page 13ShareTech Information Co., Ltd.
ShareTech Next-Gen UTM
Security Protection - Anomaly Flow Analysis
 Network Anomaly Detection
 ARP Spoofing Detection
 Prevent the spread of known worm
 Auto Prevention
 Session Log
 Access Control - Quarantine, QoS, Rate limit, IP/MAC
Here comes your footer Page 14ShareTech Information Co., Ltd.
ShareTech Next-Gen UTM
Security Protection - ARP Spoofing Protection
 ARP Spoofing is to send fake ARP messages to LAN. Its aim is to associate the
attacker's MAC address with the IP address and leads to network connection
failure.
 The first feature of ARP spoofing is data intercepted by the gateway. All the
data can only be sent to the wrong MAC address, resulting in a normal PC not
receiving the message. And the second is establishing forged gateway, so it is a
cheating gateway issued false data to the PC, rather than going through the
normal means of access routers.
 ShareTech UTM uses scheduled MAC addresses update technique to avoid
changing MAC to IP address entries by ARP attackers.
Here comes your footer Page 15ShareTech Information Co., Ltd.
ShareTech Next-Gen UTM
Security Protection - Co-Defense
 Cooperated with an SNMP managed
switch, administrators can find out
problematic devices via the UTM
management interface, and control the
devices (allow or block) instantly.
Here comes your footer Page 16ShareTech Information Co., Ltd.
ShareTech Next-Gen UTM
Security Protection - High Avaibility (HA)
 ShareTech UTM provides high
availability solution that provides
highly available services at all
times. Master system normally has
priority for serving as a gateway.
Mater and Slave systems get
connected and keep the data
synchronized.
 HA offers continuous access to
business-critical applications,
information, and services.
 Supported in UTM Series
Here comes your footer Page 17ShareTech Information Co., Ltd.
ShareTech Next-Gen UTM
Internal Control - QoS
 Smart QoS provides different priorities between individual users and
applications.
 ShareTech UTM provides QoS-guaranteed wired network. Personal bandwidth
setting can be made for personal requirements. QoS can be applied together
with personal QoS, and then bandwidth reservation can be made.
 It reserves remaining bandwidth automatically and dynamically allocates
between users in real time.
Here comes your footer Page 18ShareTech Information Co., Ltd.
ShareTech Next-Gen UTM
Internal Control - Failover Backup (Load Balance)
Outbound Load Balance
Auto distribution
Manual distribution
Distributed based on source
Distributed based on destination IP
Inbound Load Balance
Analysis of distributed DNS
Analysis of host connections
Here comes your footer Page 19ShareTech Information Co., Ltd.
ShareTech Next-Gen UTM
Internal Control - APP Control
 In-built various APP access control techniques
 Easy-to-manage network security
 Monitor employee wireless network usage
Here comes your footer Page 20ShareTech Information Co., Ltd.
ShareTech Next-Gen UTM
Internal Control - Web Filtering
 Web Filtering blocks access to sites which contains violence, adult material
and unauthorized websites which contains hackers and virus. Administrators
can define a set of policies to reduce exposure to legal liability.
Here comes your footer Page 21ShareTech Information Co., Ltd.
ShareTech Next-Gen UTM
Internal Control - URL Database
 Built-in “Cloud URL Database” which
automatically categorized webpages,
administrators can easily block the
vicious URL websites by clicking on
the target categories instead of
entering website IP address and
keywords one by one.
 The database collects almost 1, 000,
000 URLs and updates every period
of time without additional charge.
All these URLs and their contents
were analyzed and classified into 12
categories.
Here comes your footer Page 22ShareTech Information Co., Ltd.
ShareTech Next-Gen UTM
Internal Control - Authentication
 Built-in integrated authentication mechanisms such as Local AD/POP3/Radius
Servers are provided to authenticate users. Administrators monitor all user
accounts in the internal network which reduces cost and increases business
efficiency.
 Only users with valid account
and password are allowed to
enter the internal network.
Here comes your footer Page 23ShareTech Information Co., Ltd.
ShareTech Next-Gen UTM
Internal Control - IPSec VPN
 Configuration for the LAN-to-LAN
IPsec tunnel
 GRE over IPSec tunnels supported
 VPN tunnels can be established
after tunnel users (endpoints) are
authenticated using valid account
name and password.
 Other VPN devices supported
 Built-in IPsec VPN secures the site-to-site connections. After passing
authentication, more than two devices are allowed to access the same
network and transmit encrypted data over the virtual private network.
Here comes your footer Page 24ShareTech Information Co., Ltd.
ShareTech Next-Gen UTM
Internal Control - PPTP Server/Client VPN
Mal Server Web Server
 Configuration for VPN PPTP Server/Client tunnel
 Options at Client side:
-Using ShareTech VPN Broadband Router
-Windows/UNIX/Linux PPTP Client software
 Other VPN devices supported
 PPTP VPN offers point to point connection for employee at home. PPTP
creates a TCP control connection between the VPN client and VPN server to
establish a tunnel which enables employee get access to industry’s network
securely and easily.
Here comes your footer Page 25ShareTech Information Co., Ltd.
ShareTech Next-Gen UTM
Internal Control - SSL VPN
 Using web browsers (IE, Firefox,
Opera) and open webpage, enter
company IP at the address bar.
Enter connection information
(SSL VPN username and password).
 SSL VPN provides extensive network access control methods. Remote users
are requested to established security policies based on the 2 directions.
- 1. entering internal network
- 2. entering VPN Server network.
Here comes your footer Page 26ShareTech Information Co., Ltd.
ShareTech Next-Gen UTM
Record-Based Monitoring - Spam Filtering
 ShareTech UTM employs multiple spam mechanisms: ST-IP network rating,
Fingerprinting, Bayesian Filtering, Auto learning, Auto-whitelist, system and
personal Blacklist/Whitelist and Spam characteristics filtering.
 Personal blacklist/whitelist and auto-learning can be activated in more flexible
policies for high accuracy spam filtering.
Here comes your footer Page 27ShareTech Information Co., Ltd.
ShareTech Next-Gen UTM
Record-Based Monitoring - Mail Auditing
Policy EngineFilter PoliciesFilter Policies
Default Conditions
• Combined
Conditions
• Sender/Receiver
• Sender source IP
• Mail title
• Mail subject
• Mail content
• Mail capacity
• Attachments
Instant Action
• Quarantine
• Delete
• Block IP
• Send copy
• Notification
• Adjust Spam Scores
• Disable Spam Filter
Company & Mail Record Rules
• Intellectual Property Rights
• Responsibility Laws
• Invasive Data
• Sensitive Data
Legitimacy of Control
• HIPAA (Health Insurance Portability
and Accountability )
• SoX (Sarbanes-Oxley)
• Private Information Protection Law
1. Rules and Legitimacy
2. Outbound Email
3. Detection 4. Actions Taken
5. Safe Mail
Here comes your footer Page 28ShareTech Information Co., Ltd.
ShareTech Next-Gen UTM
Record-Based Monitoring - Online Behavior Tracking
 Record files transfer over WEB, Mail
(POP3 and SMTP), FTP, chat history over
instant messaging (Yahoo, ICQ, IRC,
Gadu, Jabber), and chat history and files
transfer over encrypted Skype and QQ.
Here comes your footer Page 29ShareTech Information Co., Ltd.
ShareTech Next-Gen UTM
Record-Based Monitoring - Web Browsing History
 Web browsers record stores a list of page title, time of visit and tracks visited
websites. Clicking on web history links displays scanned webpages at the moment.
Here comes your footer Page 30ShareTech Information Co., Ltd.
ShareTech Next-Gen UTM
Record-Based Monitoring - Email Delivery Record
 All incoming and outgoing mail will be
recorded along with attached files.
 Email record can be exported to a separate
EML file which is most likely to be saved in
and read in any operating system.
Here comes your footer Page 31ShareTech Information Co., Ltd.
ShareTech Next-Gen UTM
Record-Based Monitoring - Instant Messaging Record
 IM record results include start time, chat time, computer name, IP address,
IM type, account, speaker, and content. Clicking on the content icon, the
detailed chat history will display.
Here comes your footer Page 32ShareTech Information Co., Ltd.
ShareTech Next-Gen UTM
Record-Based Monitoring - Encrypted Skype/QQ Record
 In addition to user access control, complete content record (text and file
transmission) and search box are provided for administrators to find chat
history fast via the friendly interface.
Here comes your footer Page 33ShareTech Information Co., Ltd.
ShareTech Next-Gen UTM
Easy Management - Central Management System (CMS)
 Increase operation and distribution
efficiency
 Avoid costly mistakes and significantly
reduce costs in network management
 Manage customers distributed in
different areas
 Manage distributed appliances
installation across remote offices and
clients with ease
Here comes your footer Page 34ShareTech Information Co., Ltd.
ShareTech Next-Gen UTM
Easy Management - AP Management
 ShareTech UTM monitors operational status, online user status via the
management interface.
 Administrators gain controls over flow, delivery, AP groups and access to the
internal wireless network.
Here comes your footer Page 35ShareTech Information Co., Ltd.
ShareTech Next-Gen UTM
Easy Management - Flow Reports
 Chart type options allow
administrators to custom how
the chart types (bar, pie, line,
table) or texts will be displayed
at the top of the report.
 ShareTech UTM displays
operation status for the time
frame specified (day, week,
month), including
CPU/RAM/modification
times/security level/ flow
monitor reports.
Here comes your footer Page 36
Our Vision
ShareTech Next-Gen UTM Four Major Features
ShareTech Next-Gen UTM Product Series and Spec
Service and Support
Success Stories
ShareTech Information Co., Ltd.
Becoming Our Agent
What you need to know before getting starteded
Here comes your footer Page 37ShareTech Information Co., Ltd.
ShareTech Product Series and Spec
Product Line Extension
Performance
Business Size – Recommended Users

UR-910

UR-915

UR-918

UR-955

UR-958

UR-959

UR-760

UR-760F
Branch Office
Recommended
Users: 50

HiGuard Pro

UR-930

UR-935

UR-938
SME
Recommended
Users: 100
Middle-sized Business
Recommended
Users: 200
Large Enterprise
Recommended
Users: 400~1000
Firewall, IPv4/v6, QoS, Load
Balance, VPN, Content
Filter…
Anti-Virus, Anti-Spam,
Firewall, IPv4/v6, QoS,
Load Balance, VPN, Record,
Content Filter…
Anti-Virus, Anti-Spam, IDP,
Botnet, Firewall, IPv4/v6,
QoS, Load Balance, VPN,
SSL VPN , Record, Content
Filter…
Anti-Virus, Anti-Spam, IDP,
Botnet, Firewall, Co-Defense,
Audit, IPv4/v6, QoS, Load
Balance, VPN, SSL VPN,
Record, Flow Analysis, Content
Filter….
Here comes your footer
HiGuard Pro
•Throughput: 600Mbps
•160,000 sessions
•VPN: 78Mbps
•2WAN/1LAN/1DMZ
•Desktop
UR-910
•Throughput: 600Mbps
•170,000 sessions
•VPN: 85Mbps
•2WAN/1LAN/1DMZ
•1U
UR-915
•Throughput: 600Mbps
•170,000 sessions
•VPN: 85Mbps
•2WAN/1LAN/1DMZ
•1U
UR-918
•Throughput: 600Mbps
•170,000 sessions
•VPN: 85Mbps
•HTTP Anti-Virus: 65Mbps
•2WAN/1LAN/1DMZ
•1U
UR-930
•Throughput: 950Mbps
•600,000 sessions
•VPN: 240Mbps
•HTTP Anti-Virus: 120Mbps
•2WAN/1LAN/1DMZ
•1U
UR-935
•Throughput: 950Mbps
•620,000 sessions
•VPN: 280Mbps
•HTTP Anti-Virus: 124Mbps
•4WAN/1LAN/1DMZ
•1U
Page 38ShareTech Information Co., Ltd.
ShareTech Product Series and Spec
UR Series
Here comes your footer
UR-938
•Throughput: 960Mbps
•620,000 sessions
•VPN: 290Mbps
•HTTP Anti-Virus: 124Mbps
•4WAN/1LAN/1DMZ
•1U
UR-955
•Throughput: 1,000Mbps
•1,850,000 sessions
•VPN: 650Mbps
•HTTP Anti-Virus: 350Mbps
•4WAN/1LAN/1DMZ
•1U
UR-958
•Throughput: 1,000Mbps
•1,850,000 sessions
•VPN: 650Mbps
•HTTP Anti-Virus: 350Mbps
•4WAN/1LAN/1DMZ
•1U
UR-959
•Throughput: 1,600Mbps
•1,850,000 sessions
•VPN: 650Mbps
•HTTP Anti-Virus: 350Mbps
•4WAN/1LAN/1DMZ
•1U
UR-760
•Throughput: 4,800Mbps
•2,000,000 sessions
•VPN: 830Mbps
•HTTP Anti-Virus: 1,080Mbps
•4WAN/3LAN/1DMZ
•1U
Page 39ShareTech Information Co., Ltd.
ShareTech Product Series and Spec
UR Series
Here comes your footer Page 40
ShareTech Product Series and Spec
Comparison and Contrast - SME
ShareTech Information Co., Ltd.
HiGuard Pro UR-910 UR-915 UR-918 UR-930 UR-935 UR-938
HD X X 250G 250G 250G 250G 250G
Suggested Users Under 70 50-75 50-75 50-100 100-200 100-200 100-200
Firewall O O O O O O O
Outbound O O O O O O O
Inbound X X O O O O O
CMS+AP Control O O O O O O O
Co Defense X O O O O O O
VPN O O O O O O O
SSL VPN X O O O O X O
Anomaly Block X O O O O O O
IDP & BotNet X X O O O X O
Anti-Spam X X O O O O O
Anti-Virus X X O O O O O
URL Database X X O O O O O
Content Record X X X O O O X
Reports/Audit Option / X X / X X / X Option / X Option / Option X / X X / X
Here comes your footer Page 41
ShareTech Product Series and Spec
Comparison and Contrast - Enterprises
ShareTech Information Co., Ltd.
UR-955 UR-958 UR-959 UR-760 UR-760F
HD 500G 500G 500G 300G 2.5” 300G 2.5”
Suggested Users Under 400 Under 400 Under 600 600-1000 600-1000
Firewall O O O O O
Outbound O O O O O
Inbound O O O O O
CMS+AP Control O O O O O
Co Defense O O O O O
VPN O O O O O
SSL VPN X O O O O
Anomaly Block O O O O O
IDP X O O O O
BotNet O O O O O
Anti-Spam O O O O O
Anti-Virus O O O O O
URL Database O O O O O
Content Record O X O O O
Reports O O O O O
Audit Option Option Option O O
Here comes your footer Page 42
Our Vision
ShareTech Next-Gen UTM Four Major Features
ShareTech Next-Gen UTM Product Series and Spec.
Service and Support
Success Stories
ShareTech Information Co., Ltd.
Becoming Our Agent
What you need to know before getting starteded
Here comes your footer Page 43ShareTech Information Co., Ltd.
ShareTech Service and Support
Heaquarter, Branches in Taiwan & Oversea Market Expansion
19991999
TaichungTaichung
20062006
KaohsiungKaohsiung
20012001
TaipeiTaipei
20052005
ShanghaiShanghai
China, Japan, Philippine, Indonesia, Malaysia, Thailand,
Vietnam, Bangladesh, Lebanon
ShareTech Information Co., Ltd. Page 43
Here comes your footer Page 44
Our Vision
ShareTech Next-Gen UTM Four Major Features
ShareTech Next-Gen UTM Product Series and Spec.
Service and Support
Success Stories
ShareTech Information Co., Ltd.
Becoming Our Agent
What you need to know before getting starteded
Here comes your footer Page 45ShareTech Information Co., Ltd.
ShareTech Success Stories
Business
Here comes your footer Page 46ShareTech Information Co., Ltd.
ShareTech Success Stories
Governments and Schools
Here comes your footer Page 47ShareTech Information Co., Ltd.
ShareTech Online Demo
Try it online!
http://www.sharetech.com.tw/web_eng/main.php?
type=support&down=On-Line%20Demo
Here comes your footer Page 48ShareTech Information Co., Ltd.
www.sharetech.com.tw
Technical Support
 help@sharetech.com.tw
Sales Inquiry
 sales@sharetech.com.tw

More Related Content

What's hot

Đề Tài Khóa luận 2024 Một số giải pháp nâng cao hiệu quả bán hàng tại Chi nhá...
Đề Tài Khóa luận 2024 Một số giải pháp nâng cao hiệu quả bán hàng tại Chi nhá...Đề Tài Khóa luận 2024 Một số giải pháp nâng cao hiệu quả bán hàng tại Chi nhá...
Đề Tài Khóa luận 2024 Một số giải pháp nâng cao hiệu quả bán hàng tại Chi nhá...
lamluanvan.net Viết thuê luận văn
 
Đề tài: Một số giải pháp nâng cao chất lượng dịch vụ phòng tại khách sạn Sign...
Đề tài: Một số giải pháp nâng cao chất lượng dịch vụ phòng tại khách sạn Sign...Đề tài: Một số giải pháp nâng cao chất lượng dịch vụ phòng tại khách sạn Sign...
Đề tài: Một số giải pháp nâng cao chất lượng dịch vụ phòng tại khách sạn Sign...
Viết thuê trọn gói ZALO 0934573149
 
Luận văn: Quy trình bảo đảm an toàn thông tin cho doanh nghiệp
Luận văn: Quy trình bảo đảm an toàn thông tin cho doanh nghiệpLuận văn: Quy trình bảo đảm an toàn thông tin cho doanh nghiệp
Luận văn: Quy trình bảo đảm an toàn thông tin cho doanh nghiệp
Dịch vụ viết bài trọn gói ZALO 0917193864
 
Đề tài: Nghiên cứu hệ thống giám sát trên nền Camera IP, HOT
Đề tài: Nghiên cứu hệ thống giám sát trên nền Camera IP, HOTĐề tài: Nghiên cứu hệ thống giám sát trên nền Camera IP, HOT
Đề tài: Nghiên cứu hệ thống giám sát trên nền Camera IP, HOT
Dịch vụ viết bài trọn gói ZALO 0917193864
 
Hoạt động marketing hỗn hợp của Tổng công ty dịch vụ viễn thông Vinaphone đối...
Hoạt động marketing hỗn hợp của Tổng công ty dịch vụ viễn thông Vinaphone đối...Hoạt động marketing hỗn hợp của Tổng công ty dịch vụ viễn thông Vinaphone đối...
Hoạt động marketing hỗn hợp của Tổng công ty dịch vụ viễn thông Vinaphone đối...
luanvantrust
 
[123doc.vn] xay dung he thong mang cho doanh nhiep nho
[123doc.vn]   xay dung he thong mang cho doanh nhiep nho[123doc.vn]   xay dung he thong mang cho doanh nhiep nho
[123doc.vn] xay dung he thong mang cho doanh nhiep nhoNguyễn Quân
 
Đề tài: Tìm hiểu hiện trạng môi trường khu vực cảng Hải Phòng
Đề tài: Tìm hiểu hiện trạng môi trường khu vực cảng Hải PhòngĐề tài: Tìm hiểu hiện trạng môi trường khu vực cảng Hải Phòng
Đề tài: Tìm hiểu hiện trạng môi trường khu vực cảng Hải Phòng
Dịch vụ viết bài trọn gói ZALO 0917193864
 
Luận văn: Hiệu quả hệ thống quản lý chất lượng ISO 9001:2015
Luận văn: Hiệu quả hệ thống quản lý chất lượng ISO 9001:2015Luận văn: Hiệu quả hệ thống quản lý chất lượng ISO 9001:2015
Luận văn: Hiệu quả hệ thống quản lý chất lượng ISO 9001:2015
Dịch vụ viết bài trọn gói ZALO: 0909232620
 
Chiến lược marketing nhằm mở rộng thị trường tiêu thụ sản phẩm thép tại Công ...
Chiến lược marketing nhằm mở rộng thị trường tiêu thụ sản phẩm thép tại Công ...Chiến lược marketing nhằm mở rộng thị trường tiêu thụ sản phẩm thép tại Công ...
Chiến lược marketing nhằm mở rộng thị trường tiêu thụ sản phẩm thép tại Công ...
Dịch vụ viết thuê đề tài trọn gói ☎☎☎ Liên hệ ZALO/TELE: 0973.287.149 👍👍
 
Đề tài: Tìm hiểu giải pháp ảo hóa docker, HAY, 9đ
Đề tài: Tìm hiểu giải pháp ảo hóa docker, HAY, 9đĐề tài: Tìm hiểu giải pháp ảo hóa docker, HAY, 9đ
Đề tài: Tìm hiểu giải pháp ảo hóa docker, HAY, 9đ
Dịch Vụ Viết Bài Trọn Gói ZALO 0917193864
 
Các giải pháp đẩy mạnh ứng dụng Internet trong Marketing dịch vụ tại VNA
Các giải pháp đẩy mạnh ứng dụng Internet trong Marketing dịch vụ tại VNACác giải pháp đẩy mạnh ứng dụng Internet trong Marketing dịch vụ tại VNA
Các giải pháp đẩy mạnh ứng dụng Internet trong Marketing dịch vụ tại VNA
luanvantrust
 
Đánh giá hiệu quả hoạt động Marketing cho sản phẩm gỗ và ván ép của công ty Đ...
Đánh giá hiệu quả hoạt động Marketing cho sản phẩm gỗ và ván ép của công ty Đ...Đánh giá hiệu quả hoạt động Marketing cho sản phẩm gỗ và ván ép của công ty Đ...
Đánh giá hiệu quả hoạt động Marketing cho sản phẩm gỗ và ván ép của công ty Đ...
Dịch vụ viết thuê đề tài trọn gói 👉👉 Liên hệ ZALO/TELE: 0917.193.864 ❤❤
 
Luận văn: Các nhân tố ảnh hưởng đến ý định sử dụng dịch vụ đặt phòng khách sạ...
Luận văn: Các nhân tố ảnh hưởng đến ý định sử dụng dịch vụ đặt phòng khách sạ...Luận văn: Các nhân tố ảnh hưởng đến ý định sử dụng dịch vụ đặt phòng khách sạ...
Luận văn: Các nhân tố ảnh hưởng đến ý định sử dụng dịch vụ đặt phòng khách sạ...
Dịch Vụ Viết Thuê Khóa Luận Zalo/Telegram 0917193864
 
Luận văn: Xây dựng kế hoạch kinh doanh công ty chăn nuôi Phước Thành Long
Luận văn: Xây dựng kế hoạch kinh doanh công ty chăn nuôi Phước Thành LongLuận văn: Xây dựng kế hoạch kinh doanh công ty chăn nuôi Phước Thành Long
Luận văn: Xây dựng kế hoạch kinh doanh công ty chăn nuôi Phước Thành Long
Viết thuê trọn gói ZALO 0934573149
 
Hoàn thiện công tác hoạch định chiến lược kinh doanh tại công ty trách nhiệm ...
Hoàn thiện công tác hoạch định chiến lược kinh doanh tại công ty trách nhiệm ...Hoàn thiện công tác hoạch định chiến lược kinh doanh tại công ty trách nhiệm ...
Hoàn thiện công tác hoạch định chiến lược kinh doanh tại công ty trách nhiệm ...
NOT
 
Chính sách Marketing Mix nhằm mở rộng thị trường công ty dịch vụ
Chính sách Marketing Mix nhằm mở rộng thị trường công ty dịch vụChính sách Marketing Mix nhằm mở rộng thị trường công ty dịch vụ
Chính sách Marketing Mix nhằm mở rộng thị trường công ty dịch vụ
Dịch vụ viết bài trọn gói ZALO 0917193864
 
Luận văn: Hoạch định chiến lược kinh doanh công ty Khatoco, HAY
Luận văn: Hoạch định chiến lược kinh doanh công ty Khatoco, HAYLuận văn: Hoạch định chiến lược kinh doanh công ty Khatoco, HAY
Luận văn: Hoạch định chiến lược kinh doanh công ty Khatoco, HAY
Viết thuê trọn gói ZALO 0934573149
 
Nghiên cứu các yếu tố ảnh hưởng tới lòng trung thành của công nhân ngành dệt ...
Nghiên cứu các yếu tố ảnh hưởng tới lòng trung thành của công nhân ngành dệt ...Nghiên cứu các yếu tố ảnh hưởng tới lòng trung thành của công nhân ngành dệt ...
Nghiên cứu các yếu tố ảnh hưởng tới lòng trung thành của công nhân ngành dệt ...
https://www.facebook.com/garmentspace
 
Kế Toán Tiền Lương Và Các Khoản Trích Theo Lương Tại Công Ty Tnhh Năn...
Kế Toán Tiền Lương Và Các Khoản Trích Theo Lương Tại Công Ty Tnhh Năn...Kế Toán Tiền Lương Và Các Khoản Trích Theo Lương Tại Công Ty Tnhh Năn...
Kế Toán Tiền Lương Và Các Khoản Trích Theo Lương Tại Công Ty Tnhh Năn...
Nhận Viết Đề Tài Trọn Gói ZALO 0932091562
 

What's hot (20)

Đề Tài Khóa luận 2024 Một số giải pháp nâng cao hiệu quả bán hàng tại Chi nhá...
Đề Tài Khóa luận 2024 Một số giải pháp nâng cao hiệu quả bán hàng tại Chi nhá...Đề Tài Khóa luận 2024 Một số giải pháp nâng cao hiệu quả bán hàng tại Chi nhá...
Đề Tài Khóa luận 2024 Một số giải pháp nâng cao hiệu quả bán hàng tại Chi nhá...
 
Đề tài: Một số giải pháp nâng cao chất lượng dịch vụ phòng tại khách sạn Sign...
Đề tài: Một số giải pháp nâng cao chất lượng dịch vụ phòng tại khách sạn Sign...Đề tài: Một số giải pháp nâng cao chất lượng dịch vụ phòng tại khách sạn Sign...
Đề tài: Một số giải pháp nâng cao chất lượng dịch vụ phòng tại khách sạn Sign...
 
Luận văn: Quy trình bảo đảm an toàn thông tin cho doanh nghiệp
Luận văn: Quy trình bảo đảm an toàn thông tin cho doanh nghiệpLuận văn: Quy trình bảo đảm an toàn thông tin cho doanh nghiệp
Luận văn: Quy trình bảo đảm an toàn thông tin cho doanh nghiệp
 
Đề tài: Nghiên cứu hệ thống giám sát trên nền Camera IP, HOT
Đề tài: Nghiên cứu hệ thống giám sát trên nền Camera IP, HOTĐề tài: Nghiên cứu hệ thống giám sát trên nền Camera IP, HOT
Đề tài: Nghiên cứu hệ thống giám sát trên nền Camera IP, HOT
 
Hoạt động marketing hỗn hợp của Tổng công ty dịch vụ viễn thông Vinaphone đối...
Hoạt động marketing hỗn hợp của Tổng công ty dịch vụ viễn thông Vinaphone đối...Hoạt động marketing hỗn hợp của Tổng công ty dịch vụ viễn thông Vinaphone đối...
Hoạt động marketing hỗn hợp của Tổng công ty dịch vụ viễn thông Vinaphone đối...
 
[123doc.vn] xay dung he thong mang cho doanh nhiep nho
[123doc.vn]   xay dung he thong mang cho doanh nhiep nho[123doc.vn]   xay dung he thong mang cho doanh nhiep nho
[123doc.vn] xay dung he thong mang cho doanh nhiep nho
 
Đề tài: Tìm hiểu hiện trạng môi trường khu vực cảng Hải Phòng
Đề tài: Tìm hiểu hiện trạng môi trường khu vực cảng Hải PhòngĐề tài: Tìm hiểu hiện trạng môi trường khu vực cảng Hải Phòng
Đề tài: Tìm hiểu hiện trạng môi trường khu vực cảng Hải Phòng
 
Luận văn: Hiệu quả hệ thống quản lý chất lượng ISO 9001:2015
Luận văn: Hiệu quả hệ thống quản lý chất lượng ISO 9001:2015Luận văn: Hiệu quả hệ thống quản lý chất lượng ISO 9001:2015
Luận văn: Hiệu quả hệ thống quản lý chất lượng ISO 9001:2015
 
Chiến lược marketing nhằm mở rộng thị trường tiêu thụ sản phẩm thép tại Công ...
Chiến lược marketing nhằm mở rộng thị trường tiêu thụ sản phẩm thép tại Công ...Chiến lược marketing nhằm mở rộng thị trường tiêu thụ sản phẩm thép tại Công ...
Chiến lược marketing nhằm mở rộng thị trường tiêu thụ sản phẩm thép tại Công ...
 
Đề tài: Tìm hiểu giải pháp ảo hóa docker, HAY, 9đ
Đề tài: Tìm hiểu giải pháp ảo hóa docker, HAY, 9đĐề tài: Tìm hiểu giải pháp ảo hóa docker, HAY, 9đ
Đề tài: Tìm hiểu giải pháp ảo hóa docker, HAY, 9đ
 
Wireless
WirelessWireless
Wireless
 
Các giải pháp đẩy mạnh ứng dụng Internet trong Marketing dịch vụ tại VNA
Các giải pháp đẩy mạnh ứng dụng Internet trong Marketing dịch vụ tại VNACác giải pháp đẩy mạnh ứng dụng Internet trong Marketing dịch vụ tại VNA
Các giải pháp đẩy mạnh ứng dụng Internet trong Marketing dịch vụ tại VNA
 
Đánh giá hiệu quả hoạt động Marketing cho sản phẩm gỗ và ván ép của công ty Đ...
Đánh giá hiệu quả hoạt động Marketing cho sản phẩm gỗ và ván ép của công ty Đ...Đánh giá hiệu quả hoạt động Marketing cho sản phẩm gỗ và ván ép của công ty Đ...
Đánh giá hiệu quả hoạt động Marketing cho sản phẩm gỗ và ván ép của công ty Đ...
 
Luận văn: Các nhân tố ảnh hưởng đến ý định sử dụng dịch vụ đặt phòng khách sạ...
Luận văn: Các nhân tố ảnh hưởng đến ý định sử dụng dịch vụ đặt phòng khách sạ...Luận văn: Các nhân tố ảnh hưởng đến ý định sử dụng dịch vụ đặt phòng khách sạ...
Luận văn: Các nhân tố ảnh hưởng đến ý định sử dụng dịch vụ đặt phòng khách sạ...
 
Luận văn: Xây dựng kế hoạch kinh doanh công ty chăn nuôi Phước Thành Long
Luận văn: Xây dựng kế hoạch kinh doanh công ty chăn nuôi Phước Thành LongLuận văn: Xây dựng kế hoạch kinh doanh công ty chăn nuôi Phước Thành Long
Luận văn: Xây dựng kế hoạch kinh doanh công ty chăn nuôi Phước Thành Long
 
Hoàn thiện công tác hoạch định chiến lược kinh doanh tại công ty trách nhiệm ...
Hoàn thiện công tác hoạch định chiến lược kinh doanh tại công ty trách nhiệm ...Hoàn thiện công tác hoạch định chiến lược kinh doanh tại công ty trách nhiệm ...
Hoàn thiện công tác hoạch định chiến lược kinh doanh tại công ty trách nhiệm ...
 
Chính sách Marketing Mix nhằm mở rộng thị trường công ty dịch vụ
Chính sách Marketing Mix nhằm mở rộng thị trường công ty dịch vụChính sách Marketing Mix nhằm mở rộng thị trường công ty dịch vụ
Chính sách Marketing Mix nhằm mở rộng thị trường công ty dịch vụ
 
Luận văn: Hoạch định chiến lược kinh doanh công ty Khatoco, HAY
Luận văn: Hoạch định chiến lược kinh doanh công ty Khatoco, HAYLuận văn: Hoạch định chiến lược kinh doanh công ty Khatoco, HAY
Luận văn: Hoạch định chiến lược kinh doanh công ty Khatoco, HAY
 
Nghiên cứu các yếu tố ảnh hưởng tới lòng trung thành của công nhân ngành dệt ...
Nghiên cứu các yếu tố ảnh hưởng tới lòng trung thành của công nhân ngành dệt ...Nghiên cứu các yếu tố ảnh hưởng tới lòng trung thành của công nhân ngành dệt ...
Nghiên cứu các yếu tố ảnh hưởng tới lòng trung thành của công nhân ngành dệt ...
 
Kế Toán Tiền Lương Và Các Khoản Trích Theo Lương Tại Công Ty Tnhh Năn...
Kế Toán Tiền Lương Và Các Khoản Trích Theo Lương Tại Công Ty Tnhh Năn...Kế Toán Tiền Lương Và Các Khoản Trích Theo Lương Tại Công Ty Tnhh Năn...
Kế Toán Tiền Lương Và Các Khoản Trích Theo Lương Tại Công Ty Tnhh Năn...
 

Similar to ShareTech Next-Gen UTM

Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
Manoj Kumar Mishra
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
Rishabh Dangwal
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
webhostingguy
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
webhostingguy
 
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wi
niravmahida
 
ShareTech WiFi UTM
ShareTech WiFi UTMShareTech WiFi UTM
ShareTech WiFi UTM
sharetech
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
rahul kundu
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
Amare Kassa
 
CONSULTCORP- CYBEROAM CR50ING
CONSULTCORP- CYBEROAM CR50INGCONSULTCORP- CYBEROAM CR50ING
CONSULTCORP- CYBEROAM CR50ING
Cyberoam Brasil Consultcorp
 
CONSULTCORP- CYBEROAM CR35ING
CONSULTCORP- CYBEROAM CR35INGCONSULTCORP- CYBEROAM CR35ING
CONSULTCORP- CYBEROAM CR35ING
Cyberoam Brasil Consultcorp
 
USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9
Javier Arrospide
 
S T M U T M
S T M  U T MS T M  U T M
S T M U T M
Oscar Urcid
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
saloni mittal
 
Watch guard solution
Watch guard solutionWatch guard solution
Watch guard solution
laonap166
 
FortiGate-80C
FortiGate-80CFortiGate-80C
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptx
Dhanvanthkesavan
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Honeywell
 
INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL
PANKAJKUMAR2519
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
Karnav Rana
 
Advanced Internet Final
Advanced Internet FinalAdvanced Internet Final
Advanced Internet Final
mordannon
 

Similar to ShareTech Next-Gen UTM (20)

Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
 
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wi
 
ShareTech WiFi UTM
ShareTech WiFi UTMShareTech WiFi UTM
ShareTech WiFi UTM
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
CONSULTCORP- CYBEROAM CR50ING
CONSULTCORP- CYBEROAM CR50INGCONSULTCORP- CYBEROAM CR50ING
CONSULTCORP- CYBEROAM CR50ING
 
CONSULTCORP- CYBEROAM CR35ING
CONSULTCORP- CYBEROAM CR35INGCONSULTCORP- CYBEROAM CR35ING
CONSULTCORP- CYBEROAM CR35ING
 
USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9
 
S T M U T M
S T M  U T MS T M  U T M
S T M U T M
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Watch guard solution
Watch guard solutionWatch guard solution
Watch guard solution
 
FortiGate-80C
FortiGate-80CFortiGate-80C
FortiGate-80C
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptx
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Advanced Internet Final
Advanced Internet FinalAdvanced Internet Final
Advanced Internet Final
 

More from sharetech

2015眾至10月郵件伺服器教育訓練
2015眾至10月郵件伺服器教育訓練2015眾至10月郵件伺服器教育訓練
2015眾至10月郵件伺服器教育訓練
sharetech
 
Ubuntu SSL VPN
Ubuntu SSL VPNUbuntu SSL VPN
Ubuntu SSL VPNsharetech
 
ShareTech mail app使用說明
ShareTech mail app使用說明ShareTech mail app使用說明
ShareTech mail app使用說明
sharetech
 
ShareTech mail app使用說明
ShareTech mail app使用說明ShareTech mail app使用說明
ShareTech mail app使用說明
sharetech
 
如何建立IPSEC VPN
如何建立IPSEC VPN如何建立IPSEC VPN
如何建立IPSEC VPN
sharetech
 
如何設定不給上網(Http+https),但讓line和skype可以使用?
如何設定不給上網(Http+https),但讓line和skype可以使用?如何設定不給上網(Http+https),但讓line和skype可以使用?
如何設定不給上網(Http+https),但讓line和skype可以使用?sharetech
 
眾至郵件伺服器-郵件系統防護
眾至郵件伺服器-郵件系統防護眾至郵件伺服器-郵件系統防護
眾至郵件伺服器-郵件系統防護sharetech
 
如何使用Console連接眾至UTM設備
如何使用Console連接眾至UTM設備如何使用Console連接眾至UTM設備
如何使用Console連接眾至UTM設備sharetech
 
3QMail 佈署郵件VM私有雲
3QMail 佈署郵件VM私有雲3QMail 佈署郵件VM私有雲
3QMail 佈署郵件VM私有雲
sharetech
 
Company profile
Company profileCompany profile
Company profile
sharetech
 
無線UTM = WiFi+UTM
無線UTM = WiFi+UTM無線UTM = WiFi+UTM
無線UTM = WiFi+UTM
sharetech
 
UTM + AP management
UTM + AP managementUTM + AP management
UTM + AP managementsharetech
 
Mail server backup & device mgt. →email backup
Mail server backup & device mgt. →email backupMail server backup & device mgt. →email backup
Mail server backup & device mgt. →email backup
sharetech
 
Mail server backup & device mgt. →system backup
Mail server backup & device mgt. →system backupMail server backup & device mgt. →system backup
Mail server backup & device mgt. →system backup
sharetech
 
what is Multiple subnet?
what is Multiple subnet?what is Multiple subnet?
what is Multiple subnet?
sharetech
 
How to boot mail server from a usb device
How to boot mail server from a usb deviceHow to boot mail server from a usb device
How to boot mail server from a usb device
sharetech
 
眾至資訊 行動郵件簡報
眾至資訊 行動郵件簡報眾至資訊 行動郵件簡報
眾至資訊 行動郵件簡報
sharetech
 
眾至資訊分散式郵件系統
眾至資訊分散式郵件系統眾至資訊分散式郵件系統
眾至資訊分散式郵件系統sharetech
 
ShareTech Mail Server HA
ShareTech Mail Server HAShareTech Mail Server HA
ShareTech Mail Server HA
sharetech
 
IPsec vpn
IPsec vpnIPsec vpn
IPsec vpn
sharetech
 

More from sharetech (20)

2015眾至10月郵件伺服器教育訓練
2015眾至10月郵件伺服器教育訓練2015眾至10月郵件伺服器教育訓練
2015眾至10月郵件伺服器教育訓練
 
Ubuntu SSL VPN
Ubuntu SSL VPNUbuntu SSL VPN
Ubuntu SSL VPN
 
ShareTech mail app使用說明
ShareTech mail app使用說明ShareTech mail app使用說明
ShareTech mail app使用說明
 
ShareTech mail app使用說明
ShareTech mail app使用說明ShareTech mail app使用說明
ShareTech mail app使用說明
 
如何建立IPSEC VPN
如何建立IPSEC VPN如何建立IPSEC VPN
如何建立IPSEC VPN
 
如何設定不給上網(Http+https),但讓line和skype可以使用?
如何設定不給上網(Http+https),但讓line和skype可以使用?如何設定不給上網(Http+https),但讓line和skype可以使用?
如何設定不給上網(Http+https),但讓line和skype可以使用?
 
眾至郵件伺服器-郵件系統防護
眾至郵件伺服器-郵件系統防護眾至郵件伺服器-郵件系統防護
眾至郵件伺服器-郵件系統防護
 
如何使用Console連接眾至UTM設備
如何使用Console連接眾至UTM設備如何使用Console連接眾至UTM設備
如何使用Console連接眾至UTM設備
 
3QMail 佈署郵件VM私有雲
3QMail 佈署郵件VM私有雲3QMail 佈署郵件VM私有雲
3QMail 佈署郵件VM私有雲
 
Company profile
Company profileCompany profile
Company profile
 
無線UTM = WiFi+UTM
無線UTM = WiFi+UTM無線UTM = WiFi+UTM
無線UTM = WiFi+UTM
 
UTM + AP management
UTM + AP managementUTM + AP management
UTM + AP management
 
Mail server backup & device mgt. →email backup
Mail server backup & device mgt. →email backupMail server backup & device mgt. →email backup
Mail server backup & device mgt. →email backup
 
Mail server backup & device mgt. →system backup
Mail server backup & device mgt. →system backupMail server backup & device mgt. →system backup
Mail server backup & device mgt. →system backup
 
what is Multiple subnet?
what is Multiple subnet?what is Multiple subnet?
what is Multiple subnet?
 
How to boot mail server from a usb device
How to boot mail server from a usb deviceHow to boot mail server from a usb device
How to boot mail server from a usb device
 
眾至資訊 行動郵件簡報
眾至資訊 行動郵件簡報眾至資訊 行動郵件簡報
眾至資訊 行動郵件簡報
 
眾至資訊分散式郵件系統
眾至資訊分散式郵件系統眾至資訊分散式郵件系統
眾至資訊分散式郵件系統
 
ShareTech Mail Server HA
ShareTech Mail Server HAShareTech Mail Server HA
ShareTech Mail Server HA
 
IPsec vpn
IPsec vpnIPsec vpn
IPsec vpn
 

Recently uploaded

“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 

Recently uploaded (20)

“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 

ShareTech Next-Gen UTM

  • 2. Here comes your footer Page 2 ShareTech Next-Gen UTM Common network intrusion methods Network Auth. Auditing Gateway Security Hacking Prevention Network Query Identity Intrusion Prevention QoS Encrypted Connection Security Audit Layer 7 APP Control Virus Filters Intrusion, Sniffer, illegal connection DHCP MAC, IP Layer 2, ICMP, TCP UDP Anomaly VoIP P2P SSL VPN SOX HIPPA IM P2P URL SMTP/POP3 Http FTP ShareTech Information Co., Ltd.
  • 3. Here comes your footer BeforeBefore NowNow Page 3 ShareTech Next-Gen UTM Competitive Advantages for SME QoS Anti-Spam Load Balance Anti-Virus ShareTech Information Co., Ltd.
  • 4. Here comes your footer Page 4Page 4 ShareTech Next-Gen UTM Solve Your Network Problems ShareTech Information Co., Ltd.
  • 5. Here comes your footer Page 5 About ShareTech Information Co., Ltd. Company Profile Founded In 1999 Early Stage  Small Device Agent (Modem/IP Router)  System integration Developing Stage  OEM First hardware-based Mail Server in 2004  Software Development Firewall Flow Analysis, Watchlan… 2000-20101999-2000 2014- Present Stage  More than 50% employees is RD  Mail Server  UTM/ Wireless UTM  WF Solution (+AP) ShareTech Information Co., Ltd.
  • 6. Here comes your footer Page 6 Our Vision ShareTech Next-Gen UTM Four Major Features ShareTech Next-Gen UTM Product Series and Spec Service and Support Success Stories ShareTech Information Co., Ltd. Becoming Our Agent What you need to know before getting starteded
  • 7. Here comes your footer Page 7 Target Markets Strategy Becoming Our Agent Our Vision - Becoming a leading Network Security Brand SOHO SME Middle Business Government Organization Schools Financial Teleservice Business Rental Sound Management Online behavior, APP, QoS control Complete Online Behavior Record AP Management Secure wired & wireless network Internal Co-Defense Integrated with Switch Cloud CMS Make sure each spot functioned well ShareTech Information Co., Ltd.
  • 8. Here comes your footer Page 8 ShareTech Next-Gen UTM Four Major Features Security Protection Easy ManagementRecord-based Monitoring Internal Control  Anti-Virus, Anti-Spyware, Anti- Phishing, Anti-DoS, Anti-Hacking and Anti-Relay  IDP & Botnet  Co-Defense  Policy Control (QoS/VPN/Auth.)  Filter APP  Content Filter  Mail Audit  Network Load Balancing  Incoming/Outgoing mail record  IM record  FTP download record  Encrypted SKEYP & QQ record  Event log  Webpage Management  CMS  AP Control  Bulletin Board  Flow Reports ShareTech Information Co., Ltd.
  • 9. Here comes your footer Page 9 ShareTech Next-Gen UTM Security Protection - IPv4/v6 Dual Stack ShareTech Information Co., Ltd. ShareTech Next-Gen UTM IPv6 Certification Some parts of the world have already exhausted their IPv4 allocations. ShareTech UTM supports IPv4-only, IPv6-only, and dual-stack for each host. UR Series have been certificated with “IPv6 Ready” logo by the IPv6 forum.
  • 10. Here comes your footer Page 10 ShareTech Next-Gen UTM Security Protection - Anti-Virus ShareTech Information Co., Ltd.  ShareTech Next-Gen UTM firewall provides advanced threat protection such as anti-virus gateway and anti-spam gateway. With network security in place, Web and email pass through multiple threat detection engines. Security problems can be detected in real time.  Automatic Anti-Virus Signature Update: email viruses spread quickly through the network. ShareTech uses Clam AV that can be efficient in providing real-time protection to eliminates viruses, spyware, and other malware.  Viruses embedded within incoming and outgoing mail, www., and FTP will be discovered and blocked by virus scanning.
  • 11. Here comes your footer Page 11ShareTech Information Co., Ltd. ShareTech Next-Gen UTM Security Protection - IDP (Instrusion Detection Prevention)  Signatures : Default (2243), Custom  IDP Policies: Multiple, Custom  Deep Packet Inspection: inspect the packets from OSI layer 4 - 7 (app layer)  Protocol Anomaly Detection  Risk management: 3 levels (High, Medium, Low)
  • 12. Here comes your footer Page 12ShareTech Information Co., Ltd. ShareTech Next-Gen UTM Security Protection - BotNet  “BotNet” (known as Zombie Network). A bot can be left for future activation, typically runs hidden and uses IRC to communicate with its Command and Control (C&C) server.  When a command is released from the "controller", your computer performs automated tasks over the Internet. Being a vulnerable server, it will send spam distribution to many computers.  ShareTech UTM integrated with BotNet with in-built NAT which can explicitly point out the real attack running hidden and suspense malicious software spreading in the internal network.
  • 13. Here comes your footer Page 13ShareTech Information Co., Ltd. ShareTech Next-Gen UTM Security Protection - Anomaly Flow Analysis  Network Anomaly Detection  ARP Spoofing Detection  Prevent the spread of known worm  Auto Prevention  Session Log  Access Control - Quarantine, QoS, Rate limit, IP/MAC
  • 14. Here comes your footer Page 14ShareTech Information Co., Ltd. ShareTech Next-Gen UTM Security Protection - ARP Spoofing Protection  ARP Spoofing is to send fake ARP messages to LAN. Its aim is to associate the attacker's MAC address with the IP address and leads to network connection failure.  The first feature of ARP spoofing is data intercepted by the gateway. All the data can only be sent to the wrong MAC address, resulting in a normal PC not receiving the message. And the second is establishing forged gateway, so it is a cheating gateway issued false data to the PC, rather than going through the normal means of access routers.  ShareTech UTM uses scheduled MAC addresses update technique to avoid changing MAC to IP address entries by ARP attackers.
  • 15. Here comes your footer Page 15ShareTech Information Co., Ltd. ShareTech Next-Gen UTM Security Protection - Co-Defense  Cooperated with an SNMP managed switch, administrators can find out problematic devices via the UTM management interface, and control the devices (allow or block) instantly.
  • 16. Here comes your footer Page 16ShareTech Information Co., Ltd. ShareTech Next-Gen UTM Security Protection - High Avaibility (HA)  ShareTech UTM provides high availability solution that provides highly available services at all times. Master system normally has priority for serving as a gateway. Mater and Slave systems get connected and keep the data synchronized.  HA offers continuous access to business-critical applications, information, and services.  Supported in UTM Series
  • 17. Here comes your footer Page 17ShareTech Information Co., Ltd. ShareTech Next-Gen UTM Internal Control - QoS  Smart QoS provides different priorities between individual users and applications.  ShareTech UTM provides QoS-guaranteed wired network. Personal bandwidth setting can be made for personal requirements. QoS can be applied together with personal QoS, and then bandwidth reservation can be made.  It reserves remaining bandwidth automatically and dynamically allocates between users in real time.
  • 18. Here comes your footer Page 18ShareTech Information Co., Ltd. ShareTech Next-Gen UTM Internal Control - Failover Backup (Load Balance) Outbound Load Balance Auto distribution Manual distribution Distributed based on source Distributed based on destination IP Inbound Load Balance Analysis of distributed DNS Analysis of host connections
  • 19. Here comes your footer Page 19ShareTech Information Co., Ltd. ShareTech Next-Gen UTM Internal Control - APP Control  In-built various APP access control techniques  Easy-to-manage network security  Monitor employee wireless network usage
  • 20. Here comes your footer Page 20ShareTech Information Co., Ltd. ShareTech Next-Gen UTM Internal Control - Web Filtering  Web Filtering blocks access to sites which contains violence, adult material and unauthorized websites which contains hackers and virus. Administrators can define a set of policies to reduce exposure to legal liability.
  • 21. Here comes your footer Page 21ShareTech Information Co., Ltd. ShareTech Next-Gen UTM Internal Control - URL Database  Built-in “Cloud URL Database” which automatically categorized webpages, administrators can easily block the vicious URL websites by clicking on the target categories instead of entering website IP address and keywords one by one.  The database collects almost 1, 000, 000 URLs and updates every period of time without additional charge. All these URLs and their contents were analyzed and classified into 12 categories.
  • 22. Here comes your footer Page 22ShareTech Information Co., Ltd. ShareTech Next-Gen UTM Internal Control - Authentication  Built-in integrated authentication mechanisms such as Local AD/POP3/Radius Servers are provided to authenticate users. Administrators monitor all user accounts in the internal network which reduces cost and increases business efficiency.  Only users with valid account and password are allowed to enter the internal network.
  • 23. Here comes your footer Page 23ShareTech Information Co., Ltd. ShareTech Next-Gen UTM Internal Control - IPSec VPN  Configuration for the LAN-to-LAN IPsec tunnel  GRE over IPSec tunnels supported  VPN tunnels can be established after tunnel users (endpoints) are authenticated using valid account name and password.  Other VPN devices supported  Built-in IPsec VPN secures the site-to-site connections. After passing authentication, more than two devices are allowed to access the same network and transmit encrypted data over the virtual private network.
  • 24. Here comes your footer Page 24ShareTech Information Co., Ltd. ShareTech Next-Gen UTM Internal Control - PPTP Server/Client VPN Mal Server Web Server  Configuration for VPN PPTP Server/Client tunnel  Options at Client side: -Using ShareTech VPN Broadband Router -Windows/UNIX/Linux PPTP Client software  Other VPN devices supported  PPTP VPN offers point to point connection for employee at home. PPTP creates a TCP control connection between the VPN client and VPN server to establish a tunnel which enables employee get access to industry’s network securely and easily.
  • 25. Here comes your footer Page 25ShareTech Information Co., Ltd. ShareTech Next-Gen UTM Internal Control - SSL VPN  Using web browsers (IE, Firefox, Opera) and open webpage, enter company IP at the address bar. Enter connection information (SSL VPN username and password).  SSL VPN provides extensive network access control methods. Remote users are requested to established security policies based on the 2 directions. - 1. entering internal network - 2. entering VPN Server network.
  • 26. Here comes your footer Page 26ShareTech Information Co., Ltd. ShareTech Next-Gen UTM Record-Based Monitoring - Spam Filtering  ShareTech UTM employs multiple spam mechanisms: ST-IP network rating, Fingerprinting, Bayesian Filtering, Auto learning, Auto-whitelist, system and personal Blacklist/Whitelist and Spam characteristics filtering.  Personal blacklist/whitelist and auto-learning can be activated in more flexible policies for high accuracy spam filtering.
  • 27. Here comes your footer Page 27ShareTech Information Co., Ltd. ShareTech Next-Gen UTM Record-Based Monitoring - Mail Auditing Policy EngineFilter PoliciesFilter Policies Default Conditions • Combined Conditions • Sender/Receiver • Sender source IP • Mail title • Mail subject • Mail content • Mail capacity • Attachments Instant Action • Quarantine • Delete • Block IP • Send copy • Notification • Adjust Spam Scores • Disable Spam Filter Company & Mail Record Rules • Intellectual Property Rights • Responsibility Laws • Invasive Data • Sensitive Data Legitimacy of Control • HIPAA (Health Insurance Portability and Accountability ) • SoX (Sarbanes-Oxley) • Private Information Protection Law 1. Rules and Legitimacy 2. Outbound Email 3. Detection 4. Actions Taken 5. Safe Mail
  • 28. Here comes your footer Page 28ShareTech Information Co., Ltd. ShareTech Next-Gen UTM Record-Based Monitoring - Online Behavior Tracking  Record files transfer over WEB, Mail (POP3 and SMTP), FTP, chat history over instant messaging (Yahoo, ICQ, IRC, Gadu, Jabber), and chat history and files transfer over encrypted Skype and QQ.
  • 29. Here comes your footer Page 29ShareTech Information Co., Ltd. ShareTech Next-Gen UTM Record-Based Monitoring - Web Browsing History  Web browsers record stores a list of page title, time of visit and tracks visited websites. Clicking on web history links displays scanned webpages at the moment.
  • 30. Here comes your footer Page 30ShareTech Information Co., Ltd. ShareTech Next-Gen UTM Record-Based Monitoring - Email Delivery Record  All incoming and outgoing mail will be recorded along with attached files.  Email record can be exported to a separate EML file which is most likely to be saved in and read in any operating system.
  • 31. Here comes your footer Page 31ShareTech Information Co., Ltd. ShareTech Next-Gen UTM Record-Based Monitoring - Instant Messaging Record  IM record results include start time, chat time, computer name, IP address, IM type, account, speaker, and content. Clicking on the content icon, the detailed chat history will display.
  • 32. Here comes your footer Page 32ShareTech Information Co., Ltd. ShareTech Next-Gen UTM Record-Based Monitoring - Encrypted Skype/QQ Record  In addition to user access control, complete content record (text and file transmission) and search box are provided for administrators to find chat history fast via the friendly interface.
  • 33. Here comes your footer Page 33ShareTech Information Co., Ltd. ShareTech Next-Gen UTM Easy Management - Central Management System (CMS)  Increase operation and distribution efficiency  Avoid costly mistakes and significantly reduce costs in network management  Manage customers distributed in different areas  Manage distributed appliances installation across remote offices and clients with ease
  • 34. Here comes your footer Page 34ShareTech Information Co., Ltd. ShareTech Next-Gen UTM Easy Management - AP Management  ShareTech UTM monitors operational status, online user status via the management interface.  Administrators gain controls over flow, delivery, AP groups and access to the internal wireless network.
  • 35. Here comes your footer Page 35ShareTech Information Co., Ltd. ShareTech Next-Gen UTM Easy Management - Flow Reports  Chart type options allow administrators to custom how the chart types (bar, pie, line, table) or texts will be displayed at the top of the report.  ShareTech UTM displays operation status for the time frame specified (day, week, month), including CPU/RAM/modification times/security level/ flow monitor reports.
  • 36. Here comes your footer Page 36 Our Vision ShareTech Next-Gen UTM Four Major Features ShareTech Next-Gen UTM Product Series and Spec Service and Support Success Stories ShareTech Information Co., Ltd. Becoming Our Agent What you need to know before getting starteded
  • 37. Here comes your footer Page 37ShareTech Information Co., Ltd. ShareTech Product Series and Spec Product Line Extension Performance Business Size – Recommended Users  UR-910  UR-915  UR-918  UR-955  UR-958  UR-959  UR-760  UR-760F Branch Office Recommended Users: 50  HiGuard Pro  UR-930  UR-935  UR-938 SME Recommended Users: 100 Middle-sized Business Recommended Users: 200 Large Enterprise Recommended Users: 400~1000 Firewall, IPv4/v6, QoS, Load Balance, VPN, Content Filter… Anti-Virus, Anti-Spam, Firewall, IPv4/v6, QoS, Load Balance, VPN, Record, Content Filter… Anti-Virus, Anti-Spam, IDP, Botnet, Firewall, IPv4/v6, QoS, Load Balance, VPN, SSL VPN , Record, Content Filter… Anti-Virus, Anti-Spam, IDP, Botnet, Firewall, Co-Defense, Audit, IPv4/v6, QoS, Load Balance, VPN, SSL VPN, Record, Flow Analysis, Content Filter….
  • 38. Here comes your footer HiGuard Pro •Throughput: 600Mbps •160,000 sessions •VPN: 78Mbps •2WAN/1LAN/1DMZ •Desktop UR-910 •Throughput: 600Mbps •170,000 sessions •VPN: 85Mbps •2WAN/1LAN/1DMZ •1U UR-915 •Throughput: 600Mbps •170,000 sessions •VPN: 85Mbps •2WAN/1LAN/1DMZ •1U UR-918 •Throughput: 600Mbps •170,000 sessions •VPN: 85Mbps •HTTP Anti-Virus: 65Mbps •2WAN/1LAN/1DMZ •1U UR-930 •Throughput: 950Mbps •600,000 sessions •VPN: 240Mbps •HTTP Anti-Virus: 120Mbps •2WAN/1LAN/1DMZ •1U UR-935 •Throughput: 950Mbps •620,000 sessions •VPN: 280Mbps •HTTP Anti-Virus: 124Mbps •4WAN/1LAN/1DMZ •1U Page 38ShareTech Information Co., Ltd. ShareTech Product Series and Spec UR Series
  • 39. Here comes your footer UR-938 •Throughput: 960Mbps •620,000 sessions •VPN: 290Mbps •HTTP Anti-Virus: 124Mbps •4WAN/1LAN/1DMZ •1U UR-955 •Throughput: 1,000Mbps •1,850,000 sessions •VPN: 650Mbps •HTTP Anti-Virus: 350Mbps •4WAN/1LAN/1DMZ •1U UR-958 •Throughput: 1,000Mbps •1,850,000 sessions •VPN: 650Mbps •HTTP Anti-Virus: 350Mbps •4WAN/1LAN/1DMZ •1U UR-959 •Throughput: 1,600Mbps •1,850,000 sessions •VPN: 650Mbps •HTTP Anti-Virus: 350Mbps •4WAN/1LAN/1DMZ •1U UR-760 •Throughput: 4,800Mbps •2,000,000 sessions •VPN: 830Mbps •HTTP Anti-Virus: 1,080Mbps •4WAN/3LAN/1DMZ •1U Page 39ShareTech Information Co., Ltd. ShareTech Product Series and Spec UR Series
  • 40. Here comes your footer Page 40 ShareTech Product Series and Spec Comparison and Contrast - SME ShareTech Information Co., Ltd. HiGuard Pro UR-910 UR-915 UR-918 UR-930 UR-935 UR-938 HD X X 250G 250G 250G 250G 250G Suggested Users Under 70 50-75 50-75 50-100 100-200 100-200 100-200 Firewall O O O O O O O Outbound O O O O O O O Inbound X X O O O O O CMS+AP Control O O O O O O O Co Defense X O O O O O O VPN O O O O O O O SSL VPN X O O O O X O Anomaly Block X O O O O O O IDP & BotNet X X O O O X O Anti-Spam X X O O O O O Anti-Virus X X O O O O O URL Database X X O O O O O Content Record X X X O O O X Reports/Audit Option / X X / X X / X Option / X Option / Option X / X X / X
  • 41. Here comes your footer Page 41 ShareTech Product Series and Spec Comparison and Contrast - Enterprises ShareTech Information Co., Ltd. UR-955 UR-958 UR-959 UR-760 UR-760F HD 500G 500G 500G 300G 2.5” 300G 2.5” Suggested Users Under 400 Under 400 Under 600 600-1000 600-1000 Firewall O O O O O Outbound O O O O O Inbound O O O O O CMS+AP Control O O O O O Co Defense O O O O O VPN O O O O O SSL VPN X O O O O Anomaly Block O O O O O IDP X O O O O BotNet O O O O O Anti-Spam O O O O O Anti-Virus O O O O O URL Database O O O O O Content Record O X O O O Reports O O O O O Audit Option Option Option O O
  • 42. Here comes your footer Page 42 Our Vision ShareTech Next-Gen UTM Four Major Features ShareTech Next-Gen UTM Product Series and Spec. Service and Support Success Stories ShareTech Information Co., Ltd. Becoming Our Agent What you need to know before getting starteded
  • 43. Here comes your footer Page 43ShareTech Information Co., Ltd. ShareTech Service and Support Heaquarter, Branches in Taiwan & Oversea Market Expansion 19991999 TaichungTaichung 20062006 KaohsiungKaohsiung 20012001 TaipeiTaipei 20052005 ShanghaiShanghai China, Japan, Philippine, Indonesia, Malaysia, Thailand, Vietnam, Bangladesh, Lebanon ShareTech Information Co., Ltd. Page 43
  • 44. Here comes your footer Page 44 Our Vision ShareTech Next-Gen UTM Four Major Features ShareTech Next-Gen UTM Product Series and Spec. Service and Support Success Stories ShareTech Information Co., Ltd. Becoming Our Agent What you need to know before getting starteded
  • 45. Here comes your footer Page 45ShareTech Information Co., Ltd. ShareTech Success Stories Business
  • 46. Here comes your footer Page 46ShareTech Information Co., Ltd. ShareTech Success Stories Governments and Schools
  • 47. Here comes your footer Page 47ShareTech Information Co., Ltd. ShareTech Online Demo Try it online! http://www.sharetech.com.tw/web_eng/main.php? type=support&down=On-Line%20Demo
  • 48. Here comes your footer Page 48ShareTech Information Co., Ltd. www.sharetech.com.tw Technical Support  help@sharetech.com.tw Sales Inquiry  sales@sharetech.com.tw