Unified threat management software and hardware provide dynamic firewalls that can provide other security services such as VPNs and malware detection.
To qualify for inclusion in the Unified Threat Management category, a product must:
Unified Threat Management (UTM) reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.
For over 20 years, WatchGuard has pioneered cutting-edge cyber security technology and delivered it as easy-to-deploy and easy-to-manage solutions. With industry-leading network security, secure Wi-Fi, multi-factor authentication, and network intelligence products and services, WatchGuard enables businesses from around the globe to protect their most important assets.
Barracuda's Cloud Generation Firewalls redefine the role of the Firewall from a perimeter security solution to a distributed network optimization solution that scales across any number of locations and applications, connects on-premises and cloud infrastructures, and helps organizations transform their business.
UTM solutions are compact, cost-effective, all-in-one small business firewall appliances. Powered by dedicated security, rather than general purpose, processors, they deliver high-performance next-generation firewall, web, and email filtering, data loss prevention and more, easily managed via a single console. In addition, you can solve your networking needs with extensive routing, switching, Wi-Fi, LAN, and WAN capabilities.
Aker raised the level of automation and created a true Digital Fortress to include a number of features in its NGFW Firewall that, in addition to preserving the network environment, enable the efficient management of data traffic. With Failover feature rules, exclusive of Aker UTM - NGFW, the solution automatically sets the priorities of the traffic on your network so that you can retain the services of your company always working.
Get the visibility needed to proactively identify potential security issues and respond before they cause harm, with CenturyLink Analytics and Threat Management services. With CenturyLink® Analytics and Threat Management services, you get the visibility needed to proactively identify potential security issues and respond to them before they cause harm. And with our event and incident management and response services, you can ease the burden of having to develop and manage incident response in-house. Our extensive global network visibility provides prioritized threat data correlated to your IP addresses and device logs via an easy-to-use portal, or directly to your SIEM, without requiring the management of on-site equipment. With detection and response services, you get the visibility you need to proactively identify potential security issues and respond to them before they cause harm. CenturyLink’s event and incident management and response services help ease the burden of developing and managing incident response in-house.
Endian is the leading provider of open source network security and remote connectivity solutions. Our Unified Threat Management (UTM) hardware, software and virtual appliances provide comprehensive gateway security including firewall, VPN, web and email security services for small to large business networks.
Fusion's UTM is identity based, not location or physical topology. Deployment requires no changes to the user environment and the service can operate over existing customer equipment, providing the same level of data segmentation and security across all network types.
GajShield's extensive portfolio of Next Generation Firewall (NGFW) Appliances provides complete visibility into various threats and performance inhibitors allowing organisation to make informed and proactive security measure. GajShield firewall appliances provide powerful & integrated protection, enhance user productivity, granular policy definition, zero day protection providing pro-active security to networks and delivers real-time protection against fast moving threats like spyware, phishing, masked applications like Malware, Adware, P2P, Instant Messaging.
A Machine Learning and AI Platform built on Big/Fast Data Architecture for Breach Avoidance/Detection and Automated Elimination/Containment. It is an integrated solution with comprehensive threat detection and remediation built into a single platform which also covers continuous compliance, Incident response and a broad spectrum of use cases.