2 Terminate gateway-level threats with future-ready security
3 Quick Heal TERMINATOR Unified Threat Management Solution A solution that emerged out of the need to stop blended and insider threats and newer attack techniques that target the user as the weakest link for corporate information systems.Ability to perform multiple security functions in a single appliance and managed through a single console.A comprehensive solution.Recent inception in network security industry since 2004.The term Unified Threat Management (UTM) was originally forged by IDC , a leading IT market research firm.
4 Why do SMBs need UTM? Targeted Espionage Target is intellectual property or operational dataNetwork shutdown due to bogus trafficCommercially sensitive information leaksHigh potential revenue per unitSpear Phishing, Hacking, Backdoor EntryAbility to act is targetedNetwork Service disruption & degradationData pilferage| Medium revenue per unit
5 Why do SMBs need UTM? Mass Internet Attacks – DOS, DDOS Drive by exploitsWebsites knocked onlineBandwidth, disk space or CPU time unavailable to its intended usersPort Scan InfiltrationsExposes open and/ or unprotected ports to criminals who can gain access to networksWi-Fi SniffingIllegally capture and decode other people’s dataGain Internet access unethically
6 Why do SMBs need UTM? Poor network security Competence being the best asset, one data leak can ruin all that effortRepercussions to your credibility, reputation and financesBudget constraints to appoint experts for IT security needs.Typical attackers do not target individuals or businesses – they target vulnerabilities.Every computer attached to the Internet is a target.
7 Why do attackers want any and all networked computers? Any PC can be used as a spam relay.Any PC can be used as an illegal file repository.Any PC can help put a foe out of business.Any PC can host a phishing site.
21 VPNProvides the IT administrators means for secure communications with the company’s remote users and for building secure site-to-site connections.
22 Bandwidth ManagerSimplifies the IT administrator’s task of allocating bandwidth on the basis of usage among users and user groups and saves the bandwidth cost of the company as you spend only on what you need.
23 IPv6 EnabledThe appliance is ready to support IPv6 based networks.
24 Load BalancingAllows multiple ISPs to be used in a network simultaneously enabling users to utilize the same gateway irrespective of the ISP lines.
25 Automatic Link Failover Automatically diverts the data traffic from inactive ISP to active ISP lines in case any of the ISP lines fail to perform.
26 Multiple LAN/WAN/DMZ Zone Configuration Flexible interfaces which can be configured for local network, Internet and DMZ.
28 Detailed ReportsProvides on appliance extensive reporting of top websites accessed, policy breaches and bandwidth usage.
29 Role based Administrator Support Different levels of access to TERMINATOR console depending on the role of the Administrator.
30 Log ViewerAllows system admin to see all the events happening on the appliance viz. log in any changes made to settings
31 User Friendly User Interface User Interface Graphical Dashboard gives immediate status of critical security situations that need immediate attention.
32 SMS and Email Notifications Allows notifications to be sent to configured addresses and numbers. These notifications would alert the network administrator of critical network events such as detection of viruses, intrusions, update notifications, license expiry date, etc.
33 Employee Productivity Role based access control.
34 Bandwidth ManagerSimplifies the IT administrator’s task of allocating bandwidth on the basis of usage among users and user groups and saves the bandwidth cost of the company as you spend only on what you need.
35 IT Policy ManagementOn device comprehensive logging and reporting. User friendly web-based configuration.