2Terminate gateway-level threats with future-ready security
3Quick Heal TERMINATOR Unified Threat Management Solution A solution that emerged out of the need to stop blended and insider threats and newer attack techniques that target the user as the weakest link for corporate information systems.Ability to perform multiple security functions in a single appliance and managed through a single console.A comprehensive solution.Recent inception in network security industry since 2004.The term Unified Threat Management (UTM) was originally forged by IDC , a leading IT market research firm.
4Why do SMBs need UTM? Targeted Espionage Target is intellectual property or operational dataNetwork shutdown due to bogus trafficCommercially sensitive information leaksHigh potential revenue per unitSpear Phishing, Hacking, Backdoor EntryAbility to act is targetedNetwork Service disruption & degradationData pilferage| Medium revenue per unit
5Why do SMBs need UTM? Mass Internet Attacks – DOS, DDOS Drive by exploitsWebsites knocked onlineBandwidth, disk space or CPU time unavailable to its intended usersPort Scan InfiltrationsExposes open and/ or unprotected ports to criminals who can gain access to networksWi-Fi SniffingIllegally capture and decode other people’s dataGain Internet access unethically
6Why do SMBs need UTM? Poor network security Competence being the best asset, one data leak can ruin all that effortRepercussions to your credibility, reputation and financesBudget constraints to appoint experts for IT security needs.Typical attackers do not target individuals or businesses – they target vulnerabilities.Every computer attached to the Internet is a target.
7Why do attackers want any and all networked computers? Any PC can be used as a spam relay.Any PC can be used as an illegal file repository.Any PC can help put a foe out of business.Any PC can host a phishing site.
21VPNProvides the IT administrators means for secure communications with the company’s remote users and for building secure site-to-site connections.
22Bandwidth ManagerSimplifies the IT administrator’s task of allocating bandwidth on the basis of usage among users and user groups and saves the bandwidth cost of the company as you spend only on what you need.
23IPv6 EnabledThe appliance is ready to support IPv6 based networks.
24Load BalancingAllows multiple ISPs to be used in a network simultaneously enabling users to utilize the same gateway irrespective of the ISP lines.
25Automatic Link Failover Automatically diverts the data traffic from inactive ISP to active ISP lines in case any of the ISP lines fail to perform.
26Multiple LAN/WAN/DMZ Zone Configuration Flexible interfaces which can be configured for local network, Internet and DMZ.
28Detailed ReportsProvides on appliance extensive reporting of top websites accessed, policy breaches and bandwidth usage.
29Role based Administrator Support Different levels of access to TERMINATOR console depending on the role of the Administrator.
30Log ViewerAllows system admin to see all the events happening on the appliance viz. log in any changes made to settings
31User Friendly User Interface User Interface Graphical Dashboard gives immediate status of critical security situations that need immediate attention.
32SMS and Email Notifications Allows notifications to be sent to configured addresses and numbers. These notifications would alert the network administrator of critical network events such as detection of viruses, intrusions, update notifications, license expiry date, etc.
33Employee Productivity Role based access control.
34Bandwidth ManagerSimplifies the IT administrator’s task of allocating bandwidth on the basis of usage among users and user groups and saves the bandwidth cost of the company as you spend only on what you need.
35IT Policy ManagementOn device comprehensive logging and reporting. User friendly web-based configuration.