SlideShare une entreprise Scribd logo
1  sur  15
USERGATE
PROXY & FIREWALL
Internet Access Management, Information Security,
Traffic Management and Access Control
INTERNET ACCESS MANAGEMENT
   Internet access management
   Proxy servers for multiple protocols
   Multiple ISP support
   Backup channel support
   Bandwidth management
   Web caching
   IP telephony support
MULTIPLE ISP SUPPORT
BACKUP CHANNEL

Benefits:
 More reliable Internet access
 Different channels can be used for different
   types of traffic
BANDWIDTH MANAGEMENT
 Set specific bandwidth values for different
   protocols and types of traffic
 Control bandwidth for individual users
IP TELEPHONY SUPPORT
 SIP and H.323 support
 Comprehensive phone calls statistics
INFORMATION SECURITY
   Dual antivirus protection
   Firewall
   Integrated NAT driver
   VPN support
DUAL ANTIVIRUS PROTECTION
UserGate installation options:
 Without a virus scanner
 With Kaspersky Antivirus
 With Panda Antivirus
 With two antivirus modules
Functions:

Antivirus modules scan all your http, ftp, pop3
and imap traffic.

Integrated firewall module protects your system
from external intrusions.
MONITORING AND MANAGEMENT FEATURES
   Application control
   URL filtering
   Speed limitations and traffic quotas
   Real-time session monitoring
   Detailed statistics
   Billing
APLICATION CONTROL
Our unique application control module is a valuable add-on to the
standard antivirus protection. Its features include:

 Use Internet access policies (for example, you can deny access from
   older Internet Explorer versions)

 Deny Internet access to applications listed as unwanted in your corporate
   policy (download managers, instant messengers, P2P clients, etc.)

 Monitor applications used by users for Web access
Entensys URL Filtering Module
 Database with over 500 million websites (82 categories)
 All widely spoken language websites classification support




Source: Study of Internet usage by 50,000 employees at over 3,000
companies (performed by Entensys in 2009).
SESSION MONITORING AND STATISTICS
A manager can view:
  Detailed website request statistics for all employees
  Traffic cost information

The following actions may be applied to any user:
  Assign traffic quota
  Set channel bandwidth
  Deny connection via certain protocols
  Determine categories of allowed websites
  Set internet access time for a user
NETWORK ADMINISTRATION

   DHCP support
   Routing
   Resource publishing
   Remote administration
USER-FRIENDLY INTERFACE
UserGate proxy server is
controlled from the administrator
console.



Remotely administration from any
machine in your LAN or from
anywhere in the world via the
Internet.
ADVANTAGES
   Easy to integrate
   Wide range of features
   Use of innovative technologies
   Advanced reliability achieved through partnering with the
    leading vendors in the industry
   Cost efficiency


SOFTWARE PACKAGES
   UserGate Proxy & Firewall
   UserGate + 1 Antivirus module (Kaspersky or Panda)
   UserGate + 2 Antivirus modules (Kaspersky + Panda)
   UserGate + Entensys URL Filtering module
   UserGate + Entensys URL Filtering module + 1 Antivirus module
   UserGate + Entensys URL Filtering module + 2 Antivirus modules
ENTENSYS COMPANY
   Founded in 2001
   Offices in Moscow, Novosibirsk, Leipzig (Germany)
   Staff: more than 40 employees
   More details about the company and other products: http://www.entensys.com/

  STRATEGIC PARTNERS




Kaspersky Lab       Panda               BrightCloud        Commtouch
Russia              Security            USA                Israel
                    Spain

Contenu connexe

Tendances

8 questions to ask when evaluating a Cloud Access Security Broker
8 questions to ask when evaluating a Cloud Access Security Broker8 questions to ask when evaluating a Cloud Access Security Broker
8 questions to ask when evaluating a Cloud Access Security BrokerBitglass
 
Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014Sophos Benelux
 
SonicWALL Advanced Features
SonicWALL Advanced FeaturesSonicWALL Advanced Features
SonicWALL Advanced FeaturesDavid Perkins
 
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersCisco Security
 
Cloud Access Security Broker (CASB)
Cloud Access Security Broker (CASB) Cloud Access Security Broker (CASB)
Cloud Access Security Broker (CASB) rkulandaivel
 
160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architectureLan & Wan Solutions
 
Microsoft India - Forefront Threat Management Gateway 2010 Case Study
Microsoft India  - Forefront Threat Management Gateway 2010 Case StudyMicrosoft India  - Forefront Threat Management Gateway 2010 Case Study
Microsoft India - Forefront Threat Management Gateway 2010 Case StudyMicrosoft Private Cloud
 
Pro& Contra Next Generation Firewalls
Pro& Contra Next Generation FirewallsPro& Contra Next Generation Firewalls
Pro& Contra Next Generation FirewallsBelsoft
 
Istio Security Overview
Istio Security OverviewIstio Security Overview
Istio Security OverviewMichael Furman
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security BoxSophos
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall PresentationManoj Kumar Mishra
 
Borderware Security Platform
Borderware Security PlatformBorderware Security Platform
Borderware Security Platformcostigaj
 

Tendances (20)

Evento 15 aprile
Evento 15 aprileEvento 15 aprile
Evento 15 aprile
 
CTAP
CTAPCTAP
CTAP
 
8 questions to ask when evaluating a Cloud Access Security Broker
8 questions to ask when evaluating a Cloud Access Security Broker8 questions to ask when evaluating a Cloud Access Security Broker
8 questions to ask when evaluating a Cloud Access Security Broker
 
Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014
 
SonicWALL Advanced Features
SonicWALL Advanced FeaturesSonicWALL Advanced Features
SonicWALL Advanced Features
 
Forti web
Forti webForti web
Forti web
 
Sophos Utm Presentation 2016
Sophos Utm Presentation 2016Sophos Utm Presentation 2016
Sophos Utm Presentation 2016
 
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service Providers
 
Cloud Access Security Broker (CASB)
Cloud Access Security Broker (CASB) Cloud Access Security Broker (CASB)
Cloud Access Security Broker (CASB)
 
160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture
 
Microsoft India - Forefront Threat Management Gateway 2010 Case Study
Microsoft India  - Forefront Threat Management Gateway 2010 Case StudyMicrosoft India  - Forefront Threat Management Gateway 2010 Case Study
Microsoft India - Forefront Threat Management Gateway 2010 Case Study
 
Inside forti os-v524-r5
Inside forti os-v524-r5Inside forti os-v524-r5
Inside forti os-v524-r5
 
Pro& Contra Next Generation Firewalls
Pro& Contra Next Generation FirewallsPro& Contra Next Generation Firewalls
Pro& Contra Next Generation Firewalls
 
Istio Security Overview
Istio Security OverviewIstio Security Overview
Istio Security Overview
 
Web application firewall advanced
Web application firewall advancedWeb application firewall advanced
Web application firewall advanced
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security Box
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
 
FortiWeb
FortiWebFortiWeb
FortiWeb
 
Borderware Security Platform
Borderware Security PlatformBorderware Security Platform
Borderware Security Platform
 
Sandboxing
SandboxingSandboxing
Sandboxing
 

Similaire à UserGate Proxy & Firewall

Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoCristian Garcia G.
 
Kaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01aKaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01aIgor Pandzic
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPNAjay Nawani
 
FortiProxy sales presentation-02022020_Vee.pptx
FortiProxy sales presentation-02022020_Vee.pptxFortiProxy sales presentation-02022020_Vee.pptx
FortiProxy sales presentation-02022020_Vee.pptxNuttapolMix
 
Protección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
Protección y acceso a tu información y aplicaciones en Azure y O365 – BarracudaProtección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
Protección y acceso a tu información y aplicaciones en Azure y O365 – BarracudaPlain Concepts
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduseIDG Romania
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bellCisco Canada
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Benelux
 
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINXKeep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINXNGINX, Inc.
 
Acit Mumbai - understanding vpns
Acit Mumbai - understanding vpnsAcit Mumbai - understanding vpns
Acit Mumbai - understanding vpnsSleek International
 
SafeDNS for Networking Hardware Manufacturers and Software Vendors
SafeDNS for Networking Hardware Manufacturers and Software VendorsSafeDNS for Networking Hardware Manufacturers and Software Vendors
SafeDNS for Networking Hardware Manufacturers and Software VendorsSafeDNS
 
Inseptra company product solutions v2 26092014
Inseptra company product solutions v2 26092014Inseptra company product solutions v2 26092014
Inseptra company product solutions v2 26092014Mustafa Kuğu
 
Barracuda Web Filter Ip 20100629
Barracuda Web Filter Ip 20100629Barracuda Web Filter Ip 20100629
Barracuda Web Filter Ip 20100629Carolynrahn
 
12 Understanding V P Ns
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P NsAamirAziz
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A ServiceOlav Tvedt
 
Contextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsContextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsIvanti
 

Similaire à UserGate Proxy & Firewall (20)

Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
Kaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01aKaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01a
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
FortiProxy sales presentation-02022020_Vee.pptx
FortiProxy sales presentation-02022020_Vee.pptxFortiProxy sales presentation-02022020_Vee.pptx
FortiProxy sales presentation-02022020_Vee.pptx
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Protección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
Protección y acceso a tu información y aplicaciones en Azure y O365 – BarracudaProtección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
Protección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduse
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bell
 
Forti os ngfw
Forti os ngfwForti os ngfw
Forti os ngfw
 
Windows 7 by microsoft
Windows 7 by microsoft Windows 7 by microsoft
Windows 7 by microsoft
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
 
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINXKeep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
 
Acit Mumbai - understanding vpns
Acit Mumbai - understanding vpnsAcit Mumbai - understanding vpns
Acit Mumbai - understanding vpns
 
SafeDNS for Networking Hardware Manufacturers and Software Vendors
SafeDNS for Networking Hardware Manufacturers and Software VendorsSafeDNS for Networking Hardware Manufacturers and Software Vendors
SafeDNS for Networking Hardware Manufacturers and Software Vendors
 
Inseptra company product solutions v2 26092014
Inseptra company product solutions v2 26092014Inseptra company product solutions v2 26092014
Inseptra company product solutions v2 26092014
 
Barracuda Web Filter Ip 20100629
Barracuda Web Filter Ip 20100629Barracuda Web Filter Ip 20100629
Barracuda Web Filter Ip 20100629
 
12 Understanding V P Ns
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P Ns
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Contextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsContextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized Desktops
 

Dernier

AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekCzechDreamin
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityScyllaDB
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPTiSEO AI
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 

Dernier (20)

AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 

UserGate Proxy & Firewall

  • 1. USERGATE PROXY & FIREWALL Internet Access Management, Information Security, Traffic Management and Access Control
  • 2. INTERNET ACCESS MANAGEMENT  Internet access management  Proxy servers for multiple protocols  Multiple ISP support  Backup channel support  Bandwidth management  Web caching  IP telephony support
  • 3. MULTIPLE ISP SUPPORT BACKUP CHANNEL Benefits:  More reliable Internet access  Different channels can be used for different types of traffic
  • 4. BANDWIDTH MANAGEMENT  Set specific bandwidth values for different protocols and types of traffic  Control bandwidth for individual users
  • 5. IP TELEPHONY SUPPORT  SIP and H.323 support  Comprehensive phone calls statistics
  • 6. INFORMATION SECURITY  Dual antivirus protection  Firewall  Integrated NAT driver  VPN support
  • 7. DUAL ANTIVIRUS PROTECTION UserGate installation options:  Without a virus scanner  With Kaspersky Antivirus  With Panda Antivirus  With two antivirus modules Functions: Antivirus modules scan all your http, ftp, pop3 and imap traffic. Integrated firewall module protects your system from external intrusions.
  • 8. MONITORING AND MANAGEMENT FEATURES  Application control  URL filtering  Speed limitations and traffic quotas  Real-time session monitoring  Detailed statistics  Billing
  • 9. APLICATION CONTROL Our unique application control module is a valuable add-on to the standard antivirus protection. Its features include:  Use Internet access policies (for example, you can deny access from older Internet Explorer versions)  Deny Internet access to applications listed as unwanted in your corporate policy (download managers, instant messengers, P2P clients, etc.)  Monitor applications used by users for Web access
  • 10. Entensys URL Filtering Module  Database with over 500 million websites (82 categories)  All widely spoken language websites classification support Source: Study of Internet usage by 50,000 employees at over 3,000 companies (performed by Entensys in 2009).
  • 11. SESSION MONITORING AND STATISTICS A manager can view:  Detailed website request statistics for all employees  Traffic cost information The following actions may be applied to any user:  Assign traffic quota  Set channel bandwidth  Deny connection via certain protocols  Determine categories of allowed websites  Set internet access time for a user
  • 12. NETWORK ADMINISTRATION  DHCP support  Routing  Resource publishing  Remote administration
  • 13. USER-FRIENDLY INTERFACE UserGate proxy server is controlled from the administrator console. Remotely administration from any machine in your LAN or from anywhere in the world via the Internet.
  • 14. ADVANTAGES  Easy to integrate  Wide range of features  Use of innovative technologies  Advanced reliability achieved through partnering with the leading vendors in the industry  Cost efficiency SOFTWARE PACKAGES  UserGate Proxy & Firewall  UserGate + 1 Antivirus module (Kaspersky or Panda)  UserGate + 2 Antivirus modules (Kaspersky + Panda)  UserGate + Entensys URL Filtering module  UserGate + Entensys URL Filtering module + 1 Antivirus module  UserGate + Entensys URL Filtering module + 2 Antivirus modules
  • 15. ENTENSYS COMPANY  Founded in 2001  Offices in Moscow, Novosibirsk, Leipzig (Germany)  Staff: more than 40 employees  More details about the company and other products: http://www.entensys.com/ STRATEGIC PARTNERS Kaspersky Lab Panda BrightCloud Commtouch Russia Security USA Israel Spain

Notes de l'éditeur

  1. As seen on the chart, UGPF - this is a complex solution to manage shared Internet access on a local network, to monitor traffic and protect the corporate LAN from external threats. The solution is multifunctional /as listed on the slide/. We will review several of these functions in more detail.
  2. Working with several providers permits the economical distribution of Internet resources. For example, a high-speed SAT line is assigned to the director, and employees receive a less expensive and slower one. In today's contemporary society, all of an employee's activity is directly tied to the Internet. That is why it is important that no work downtime occurs in the company as a result of the network being down. Thanks to the backup channel, the problem is easily resolved. When the Internet is not available on the primary channel, unknown to the user, the Internet is reconnected to the backup channel.
  3. The next important function is management of the bandwidth for individual users, as well as for protocols and different types of traffic. This function permits the convenient and streamlined distribution of bandwidth for Internet users. For example, to conduct an online conference an employee may increase bandwidth, and accordingly, employees using only e-mail may decrease bandwidth.
  4. IP-Telephony lessens the burden on landlines. This is especially relevant in companies where employees make a large number of calls as part of their work.
  5. UserGate applies a multidimensional approach to LAN security and utilizes the most modern methods to combat Internet-based threats such as viruses, malware and hacker intrusions. The integrated firewall provides additional protection from attacks against the network and other type of intrusions.The integrated NAT driver permits the full utilization of the product. UserGate Proxy & Firewall support "tunnel" or pathway protocols, thereby permitting the use of VPN to securely connect remote branches, offices, banks, etc. In the line's upcoming Version 6, an integrated VPN server will be provided, which will be able to not only allow and support tunneling, but will be able to imitate a VPN connection.
  6. It is important for any company director to know how the Internet is being used, how work time is being used, how it is all being balanced, etc. Thanks to complete monitoring and review of statistical data, it is easy for a supervisor to assess a situation and make correct decisions.
  7. Additional monitoring and protection for the company is provided by a Filter Sites by Category Module, which is based on Entensys URL Filtering Technology. This technology uses an enormous database, more than 500 million sites that are divided into 82 categories. The advantages of this database are:- the responsiveness of the database, that is to say the content of the sites is continuously rechecked by robots and people for subject content that is related to the required categories;- daily update of the database;- it contains a large number of poorly reputed sites.According to studies, it has been determined that employees in a company utilize the Internet 42% of the time for unauthorized purposes.Firstly, this lowers employees' performance; secondly there is a great probability of malware or viruses being introduced into the system.Therefore, it is necessary to understand the importance of monitoring and managing Internet access.
  8. /Slide for administrators/With the aid of UserGate, one may execute several routine operations that allow one to simplify their network administration.For example, the internal Dynamic Host Configuration Protocol (DHCP)-server automates the IP-address selection process by computers and other devices in the LAN (it is not required to manually type the address).If a computer with UserGate is connected to several LANs, UserGate server may be set up as a router, ensuring transparent and bidirectional communication between LANs.The publication of resources grants access to internal company resources such as the Web, FTP, VPN or to the mail server. And finally, remote administration allows for remote connection to the LAN via the Internet from any computer on which the UserGate Administrator Console has been installed.