The Next Security Generation Is Here!
ARE YOU READY?
It's no secret that security threats are on the rise. Everywhere you look; there are reports on new breaches, hacking/phishing attacks, spam, malware, Trojans, botnet attacks and more. With Webroam UTM you choose the protection you need and a platform that best suits your business.
- EASY TO MANAGE
Webroam's UTM has a dynamic dashboard that makes observation and monitoring of the latest network activities of the set possible.
CPU, RAM, HDD USAGE
Real time usage of CPU, RAM and HDD is available in the first page of the management panel.
NEWS & ALERTS
Latest news and system's and security warnings are shown in news section of dashboard. By clicking on each news link, you can see the news' passage.
Another Webroam's UTM's feature is flexible and addable license.
It is one of the security modules of Webroam UTM. By this, administrator can control users' web activities.
Email is one of the ways of spreading the infection in an organization. Webroam oversees all inputs and outputs of email through SMTP and POP3 protocols.
Webroam firewall has an engine to detect and prevent spams. Although the anti-spam finds spam perfectly, it is possible to upgrade and define new rules for preventing spam emails.
LOGS AND REPORT
Some of the key features of Webroam UTM are reporting and event logging. It is possible to print and export the reports of Content Filtering, Firewall, IPS and Visited Site.
Webroam UTM lets the organization define and apply different security and management policies. The policies are access level, authentication, content-filtering and anti-virus.
Gateway security transfers the security to the beginning point of the organization. Different security layers are prepared in Webroam UTM. Some more important are Firewall, IPS, Gateway Antivirus, Content & URL Filtering and Email Security.
Network administrator can check the system status, running connections, network, system charts, proxy and VPN connection all online.
VPN (SSL & IPSec)
A VPN is a private network that uses a public network (usually the Internet) to connect remote sites or users together. The VPN uses "virtual" connections routed through the Internet from the business's private network to the remote site or employee.
It saves data in house and by doing so will improve speed of loading web pages and also it causes the used bandwidth to be reduced.
INTRUSION PREVENTION SYSTEM
They are network security appliances that monitor network and/or system activities for malicious activity. Their main functions are to identify malicious activity, log information about them, attempt to block/stop.
Allows network devices to automatically obtain a valid IP address from the set.
ROUTING (STATIC, DYNAMIC)
In addition to default routing, it is possible to set dynamic and static policies and improve routing process.
MULTI-WAN (WITH FAILOVER)
Automatic detection of failed WAN link and routing to working link. It provides continuous service and application availability.
If the administrator activates it, the set sends him email to report if there is something wrong. Also, latest information about the set and its status are sent by SMS.
QUALITY OF SERVICE (QOS)
It is a method to guarantee a bandwidth relationship between individual applications or protocols.
STATEFUL INSPECTION FIREWALL
The set is configurable through a web management dashboard. It is possible to define policies and check different parts of system in it.
WebRoam UTM Anti-Virus is just one feature in an all-inclusive package that handles the detection and removal of all types of malwares.
A virtual LAN, commonly known as a VLAN, is a group of hosts with a common set of requirements that communicate as if they were attached to the same broadcast domain, regardless of their physical location.
It is the permission given by administrators that sets limits on the user, groups by time and/or quotas. You can set a daily/monthly/yearly timed access quota by user, or group.
It includes some modules for monitoring and blocking different network traffics. These modules are Port forwarding/NAT, Outgoing /Inter-Zone/VPN traffic & System access. In Addition, defining custom rules for services, ports & protocols are possible.