SlideShare a Scribd company logo
1 of 17
www.Seqrite.com 1
Enterprise Security
Solutions by
www.Seqrite.com 2
Webinar by: Rohit Waghmare
Pre - Sales Consultant: Gateway Security
rohit.waghmare@seqrite.com
www.Seqrite.com 3
Agenda
• What is Gateway Level Protection?
 What is Firewall?
 What is the need of Unified Management?
 What is UTM?
 Difference between UTM & Firewall
• Why you should switch to UTM-Gateway Level Protection
• Features and advantages offered by UTM.
• How Seqrite-Terminator helps to attain highest Safety, management and security
www.Seqrite.com
2016 - Average Day - Enterprise Attacks
www.Seqrite.com 5
Risk in Unprotected Network
• Cyber Attacks
• Hacking
• Spyware
• Virus
• Worms
• Trojan Horses
• Phishing
• Ransomeware attacks
• Unauthorized Usage
• Modification or Deletion of
Files
• Keystroke Loggings
• Malicious Attacks
• Adware
www.Seqrite.com 6
Basic function of a firewall
• A firewall is a network security system that
monitors & controls the incoming outgoing
network.
• A firewall typically establishes a barrier
between a trusted secured internet network
and another network.
• This can be software based , hardware
based or both software & hardware.
www.Seqrite.com 7
• Powrful Primary Shield
• All in one Solution
• User Friendly & Simple
• Only one Hardware
• ISP Load Balancing
• Faster Computation
• Secured VPN
• Comprehensive
Logging & Reporting
www.Seqrite.com 8
Evolution of UTM
Traditional Firewall NGFW UTM
• FIREWALL • FIREWALL
• APPLICATION
CONTROL
• IPS
• FIREWALL
• APPLICATION CONTROL
• IPS
• BANDWITH & QUOTA MANAGEMENT
• CONTENT FILTERING
• LOAD BALANCING & AUTO-LINK FAILURE
• VPN
• MAIL PROTECTION
• ANTI-VIRUS
www.Seqrite.com
IT CHALLENGES FOR ENTERPRISE
9
www.Seqrite.com
SEQRITE TERMINATOR
10
www.Seqrite.com 11
How UTM Protects you
NETWORKING
• ISP Load Balancing
• Policy Based Routing
• Automatic Gateway Failover
• DNS & DHCP Server
• USB Internet Support 3G/4G
• IP & Port Forwarding
• Configurable LAN/WAN/DMZ
ports
• Link Aggregation
C0NTENT FILTERING
• Category Based
• Custom Web List
• http & https blocking
• Bandwidth limit for each
profile/user
• Time based access limit
• Bandwidth Management
• Data Quota Management
• Key Word Blocking
www.Seqrite.com 12
How UTM Protects you
FIREWALL & SECURITY
• FIREWALL
a)Traffic Logging
b)Predefined Firewall Rule
c)Zone Support
• Stateful Inspection
• Instrusion Prevention System
• Gateway Antivirus
MAIL PROTECTION
• Mail Antivirus & Anti-Spam
(SMTP,POP3 & IMAP)
• Attachment Control
• Keyword Blocking in email
www.Seqrite.com 13
How UTM Protects you
MONITORING & REPORTS
• Daily, weekly and Monthly
Report
• Log Viewer
• Alerts ( Email and SMS )
• Internal Services Usage
VPN
• IPSec
• PPTP
• SSL VPN
USER AUTHENTICATION
• Internal Database
• AD integration
• IP/MAC binding
• LDAP Integration
• Guest User support
ADMINISTRATION
• Web Portal Customization
• Backup & Restore Configuration
• Administrative Profile
Managent
• Multiple Administrative
Support
www.Seqrite.com 14
Ease of Management
Group Creation
www.Seqrite.com 15
Ease of Reports
Policy Breach Report
www.Seqrite.com 16
Seqrite Terminator UTM Models
Terminator Models T2S-10 T2S-30 T2S-60 T2M-100 T2M-250
Hardware ID T2S10 1035/1035S 3675 T2M100 T2M250
H/W Specs
CPU AMD AMD AMD AMD Intel
Speed 1.0 GHz 1.0 GHz 1.6 GHz 2.3GHz 3.50 GHz
# of cores 2 2 4 4 2
Cache per core 1 MB 1 MB 2 MB 4 MB 4 MB
RAM 1GB DDR3 2GB DDR3 2GB DDR3 4GB DDR3 4GB DDR3
Storage 16GB SSD
16GB MLC CF / 32
GB SSD
64GB SSD 128 GB SSD 240 GB SSD
Copper GbE ports 3 4 6 8 10
Console port 1 1 1 1 1
USB Ports 2 2 2 2 2
www.Seqrite.com 17
Thank You
• Call us at: 020-66813139
• Write to us at: utmsales@seqrite.com
• Visit us at: www.seqrite.com
No Matter how small or big you
network .
TERMINATOR is one point Powerful
security Solution

More Related Content

What's hot

What's hot (20)

Take the Ransom Out of Ransomware
Take the Ransom Out of RansomwareTake the Ransom Out of Ransomware
Take the Ransom Out of Ransomware
 
Cambodia CERT Seminar: Incident response for ransomeware attacks
Cambodia CERT Seminar: Incident response for ransomeware attacksCambodia CERT Seminar: Incident response for ransomeware attacks
Cambodia CERT Seminar: Incident response for ransomeware attacks
 
The Nitty Gritty of Website Security
The Nitty Gritty of Website SecurityThe Nitty Gritty of Website Security
The Nitty Gritty of Website Security
 
How Malware Works
How Malware WorksHow Malware Works
How Malware Works
 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla Isolation
 
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
 New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
 
How to Detect System Compromise & Data Exfiltration with AlienVault USM
How to Detect System Compromise & Data Exfiltration with AlienVault USMHow to Detect System Compromise & Data Exfiltration with AlienVault USM
How to Detect System Compromise & Data Exfiltration with AlienVault USM
 
Cloud Security Introduction
Cloud Security IntroductionCloud Security Introduction
Cloud Security Introduction
 
The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?
 
Alienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworksAlienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworks
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?
 
Integrated Tools in OSSIM
Integrated Tools in OSSIMIntegrated Tools in OSSIM
Integrated Tools in OSSIM
 
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USM
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
Database security for PHP
Database security for PHPDatabase security for PHP
Database security for PHP
 
How to Detect SQL Injections & XSS Attacks with AlienVault USM
How to Detect SQL Injections & XSS Attacks with AlienVault USM How to Detect SQL Injections & XSS Attacks with AlienVault USM
How to Detect SQL Injections & XSS Attacks with AlienVault USM
 
Cyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeCyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat Landscape
 

Similar to Next-Gen Security Solution: Gateway Protection

Similar to Next-Gen Security Solution: Gateway Protection (20)

Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
 
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics
 
HIPAA 101 Compliance Threat Landscape & Best Practices
HIPAA 101 Compliance Threat Landscape & Best PracticesHIPAA 101 Compliance Threat Landscape & Best Practices
HIPAA 101 Compliance Threat Landscape & Best Practices
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
 
Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation Firewall
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
Cloud monitoring - An essential Platform Service
Cloud monitoring  - An essential Platform ServiceCloud monitoring  - An essential Platform Service
Cloud monitoring - An essential Platform Service
 
Network Design and Security Best Practices
Network Design and Security Best PracticesNetwork Design and Security Best Practices
Network Design and Security Best Practices
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
 
Security On The Cloud
Security On The CloudSecurity On The Cloud
Security On The Cloud
 
Sophos XG Firewall
Sophos XG FirewallSophos XG Firewall
Sophos XG Firewall
 
Fortigate class1
Fortigate class1Fortigate class1
Fortigate class1
 
The 7 Steps to a Successful Cyberattack: How to Defend Against Them
The 7 Steps to a Successful Cyberattack: How to Defend Against ThemThe 7 Steps to a Successful Cyberattack: How to Defend Against Them
The 7 Steps to a Successful Cyberattack: How to Defend Against Them
 
Security chapter6
Security chapter6Security chapter6
Security chapter6
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
 
Firewall Management: What Is It?
Firewall Management: What Is It?Firewall Management: What Is It?
Firewall Management: What Is It?
 
Fortigate Training
Fortigate TrainingFortigate Training
Fortigate Training
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
 
Panda Security - Gatedefender
Panda Security - GatedefenderPanda Security - Gatedefender
Panda Security - Gatedefender
 

More from Quick Heal Technologies Ltd.

More from Quick Heal Technologies Ltd. (20)

Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 
GITEX 2016, Dubai
GITEX 2016, Dubai GITEX 2016, Dubai
GITEX 2016, Dubai
 
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
 
Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016
 
Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016 Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016
 
Seqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, IndiaSeqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, India
 
Fonetastic ppt
Fonetastic pptFonetastic ppt
Fonetastic ppt
 
Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.
 
BFSI Leadership Summit, Mumbai
BFSI Leadership Summit, MumbaiBFSI Leadership Summit, Mumbai
BFSI Leadership Summit, Mumbai
 
Jnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher education
 
Event S-Mart Milan, Italy - May 2016
Event S-Mart Milan, Italy - May 2016Event S-Mart Milan, Italy - May 2016
Event S-Mart Milan, Italy - May 2016
 
Event S-Mart 2016 Florence, Italy - April 2016
Event S-Mart 2016 Florence, Italy - April 2016Event S-Mart 2016 Florence, Italy - April 2016
Event S-Mart 2016 Florence, Italy - April 2016
 
25th Japan IT Week 2016
25th Japan IT Week 201625th Japan IT Week 2016
25th Japan IT Week 2016
 
Cyber Security Predictions 2016
Cyber Security Predictions 2016Cyber Security Predictions 2016
Cyber Security Predictions 2016
 

Recently uploaded

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 

Recently uploaded (20)

SHRMPro HRMS Software Solutions Presentation
SHRMPro HRMS Software Solutions PresentationSHRMPro HRMS Software Solutions Presentation
SHRMPro HRMS Software Solutions Presentation
 
%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 

Next-Gen Security Solution: Gateway Protection

  • 2. www.Seqrite.com 2 Webinar by: Rohit Waghmare Pre - Sales Consultant: Gateway Security rohit.waghmare@seqrite.com
  • 3. www.Seqrite.com 3 Agenda • What is Gateway Level Protection?  What is Firewall?  What is the need of Unified Management?  What is UTM?  Difference between UTM & Firewall • Why you should switch to UTM-Gateway Level Protection • Features and advantages offered by UTM. • How Seqrite-Terminator helps to attain highest Safety, management and security
  • 4. www.Seqrite.com 2016 - Average Day - Enterprise Attacks
  • 5. www.Seqrite.com 5 Risk in Unprotected Network • Cyber Attacks • Hacking • Spyware • Virus • Worms • Trojan Horses • Phishing • Ransomeware attacks • Unauthorized Usage • Modification or Deletion of Files • Keystroke Loggings • Malicious Attacks • Adware
  • 6. www.Seqrite.com 6 Basic function of a firewall • A firewall is a network security system that monitors & controls the incoming outgoing network. • A firewall typically establishes a barrier between a trusted secured internet network and another network. • This can be software based , hardware based or both software & hardware.
  • 7. www.Seqrite.com 7 • Powrful Primary Shield • All in one Solution • User Friendly & Simple • Only one Hardware • ISP Load Balancing • Faster Computation • Secured VPN • Comprehensive Logging & Reporting
  • 8. www.Seqrite.com 8 Evolution of UTM Traditional Firewall NGFW UTM • FIREWALL • FIREWALL • APPLICATION CONTROL • IPS • FIREWALL • APPLICATION CONTROL • IPS • BANDWITH & QUOTA MANAGEMENT • CONTENT FILTERING • LOAD BALANCING & AUTO-LINK FAILURE • VPN • MAIL PROTECTION • ANTI-VIRUS
  • 11. www.Seqrite.com 11 How UTM Protects you NETWORKING • ISP Load Balancing • Policy Based Routing • Automatic Gateway Failover • DNS & DHCP Server • USB Internet Support 3G/4G • IP & Port Forwarding • Configurable LAN/WAN/DMZ ports • Link Aggregation C0NTENT FILTERING • Category Based • Custom Web List • http & https blocking • Bandwidth limit for each profile/user • Time based access limit • Bandwidth Management • Data Quota Management • Key Word Blocking
  • 12. www.Seqrite.com 12 How UTM Protects you FIREWALL & SECURITY • FIREWALL a)Traffic Logging b)Predefined Firewall Rule c)Zone Support • Stateful Inspection • Instrusion Prevention System • Gateway Antivirus MAIL PROTECTION • Mail Antivirus & Anti-Spam (SMTP,POP3 & IMAP) • Attachment Control • Keyword Blocking in email
  • 13. www.Seqrite.com 13 How UTM Protects you MONITORING & REPORTS • Daily, weekly and Monthly Report • Log Viewer • Alerts ( Email and SMS ) • Internal Services Usage VPN • IPSec • PPTP • SSL VPN USER AUTHENTICATION • Internal Database • AD integration • IP/MAC binding • LDAP Integration • Guest User support ADMINISTRATION • Web Portal Customization • Backup & Restore Configuration • Administrative Profile Managent • Multiple Administrative Support
  • 14. www.Seqrite.com 14 Ease of Management Group Creation
  • 15. www.Seqrite.com 15 Ease of Reports Policy Breach Report
  • 16. www.Seqrite.com 16 Seqrite Terminator UTM Models Terminator Models T2S-10 T2S-30 T2S-60 T2M-100 T2M-250 Hardware ID T2S10 1035/1035S 3675 T2M100 T2M250 H/W Specs CPU AMD AMD AMD AMD Intel Speed 1.0 GHz 1.0 GHz 1.6 GHz 2.3GHz 3.50 GHz # of cores 2 2 4 4 2 Cache per core 1 MB 1 MB 2 MB 4 MB 4 MB RAM 1GB DDR3 2GB DDR3 2GB DDR3 4GB DDR3 4GB DDR3 Storage 16GB SSD 16GB MLC CF / 32 GB SSD 64GB SSD 128 GB SSD 240 GB SSD Copper GbE ports 3 4 6 8 10 Console port 1 1 1 1 1 USB Ports 2 2 2 2 2
  • 17. www.Seqrite.com 17 Thank You • Call us at: 020-66813139 • Write to us at: utmsales@seqrite.com • Visit us at: www.seqrite.com No Matter how small or big you network . TERMINATOR is one point Powerful security Solution