NETGEAR unveils new VDSL application firewall
Posted on 15 November 2012.
NETGEAR introduced the ProSecure UTM25S Unified Threat Management Firewall, which provides two modular slots that fit optional interface cards, enabling IT administrators to custom-tailor the firewall to their specific connectivity requirements.


The UTM25S integrates with NETGEAR ReadyNAS network-attached storage systems, giving businesses almost unlimited activity log and quarantine capacity for forensic, regulatory and legal requirements.

The firewall delivers comprehensive Internet security as well as high-speed Internet access through a choice of WAN connections-built-in Ethernet ports, an optional VDSL modem module, or a qualified 3G USB dongle. It also offers a wireless-N access point module and is a best-in-class UTM firewall gateway recommended to support up to 25 users.

Targeted at small and medium businesses and remote/branch offices looking to make the move from a standard firewall to a UTM application firewall solution, the ProSecure UTM25S significantly extends the security of a network without the normally associated vendor complexity or costs.

In general, traditional all-in-one solutions claiming to provide enterprise-grade security protection have incorporated batch-based methods to scan incoming high-latency data, which can slow Web browsing to a crawl.

To address this, many of these solutions attempted to overcome this challenge by scanning only a select few malware file types, or by avoiding Web scanning altogether, which opened up networks to malware-based attacks. NETGEAR ProSecure UTM S solutions address this issue with the patented Stream Scanning platform, which analyzes data streams as they enter the network.

"Because of the always increasing amount of latency-sensitive Web traffic, combining enterprise-grade security into a traditional all-in-one firewall platform has proven a daunting challenge," said Peter Newton, senior director of product management for the Commercial Business Unit of NETGEAR. "We developed the UTM25S as a direct result of customer feedback. It fills a strategic gap for customers that require all of the features of our UTM9S appliance, but have a higher volume of Internet traffic to manage."





Spotlight

Targeted attack protection via network topology alteration

Posted on 17 October 2014.  |  This article from Trend Micro tackles how network topology can aid in defending the enterprise network from risks posed by targeted attacks.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Oct 20th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //