SecPoint Protector UTM Firewall VPN

Advanced firewall and UTM ransomware blocking.

– The #1 Best Cybersecurity Firewall.

  •  No data collection. Complete privacy.
  •  Automatically blocks 600 million bad IP addresses.
  •  MS Active Directory User Synchronization.
  •  Anti-spam quarantine web filter groups.
  •  Blocks ransomware/malware/trojans/spam bots.
  •  Easy to use web GUI interface.
  •  24/7 fast support, ticket system, live chat.

Main features

Firewall de Próxima Geração
VPN Segura
Prevenção de Intrusões
Filtragem de Conteúdo
Proteção contra Malware

Full description

Request a quote

– Complete network protection.

  • Two-factor authentication 2FA login.
  •  High-speed IPS intrusion prevention system.
  •  Enable up to 3 antivirus engines.
  •  Advanced antispam with authentication support.
  •  14 languages in anti-spam warning emails.

– Strong UTM firewall device.

  •  IPsec VPN and Wireguard VPN.
  •  1U Rack or Virtual ESXi, Hyper-V, Linux images.
  •  Blocks denial of service attacks.
  •  Unlimited email domains to protect.
  •  Easily block entire countries.
  •  Alert Center Easily receive notifications about network incidents.

– List of protector functions.

  • Complete cybersecurity
  • Antispam and antivirus
  • Various antivirus engines: ESET, ClamAV, Kaspersky.
  • Spam checking based on the entire email content.
  • advanced RBL management
  • Greylisting technology
  • Web filter and caching proxy
  • Content filter to block P2P, VoIP, games, etc.
  • IPS – Intrusion Prevention System
  • HTTP Web Proxy Internet Filter
  • SaaS Software as a Service
  • Unified Cloud UTM Threat
  • Daily anti-spam quarantine
  • Full email archiving functionality to store all incoming and outgoing emails
  • Multi-user quarantine. Users can log in individually to the quarantine.
  • Adjusting the antispam score per user
  • Two-factor authentication (2FA) compatible with Google Authenticator
  • Traffic Shaping with traffic prioritization capability
  • Archiving incoming emails
  • firewall
  • Time-based web filter
  • VPN tunnels, IPsec, PPTP, Wireguard VPN
  • Wifi Defender
  • Entry and exit scanning
  • Microsoft Active Directory/LDAP support for web filtering and anti-spam quarantine
  • High Availability – Maestro – Customer Service
  • Vulnerability scanner
  • Alert meters with notification triggers. Customizable with Alert Center.
  • System status
  • Firmware update

– Key Protector UTM Firewall Features and Facts.

  • Protector is an all-in-one solution, with a wealth of features at one price.
  • Made in Denmark – Safe Design
  • Protector is actively developed with attention to direct customer requirements.
  • We also make major software updates based on customer requirements.
  • None of the larger competitors convert specific customer requirements into projects.
  • The IPS intrusion prevention module can block attacks on SCADA and other services.
  • No software performance limits or VPN tunnel blocking. Limited only by virtual and hardware CPU specifications.
  • Cost-effective. All modules are included at a single cost, with support and updates.
  • All data is located solely on the client's website; no data is collected. No backdoors.
  • Quick deployment with tabs in the setup wizard.
  • Blocks local and external threats.
  • It comes with advanced antivirus, anti-spam, and web filtering with grouping policy.
  • Full integration with Microsoft Active Directory LDAP. Next-generation firewall with VPN.
  • Advanced content filtering.
  • The web filter can block social networking sites (Facebook, Twitter, LinkedIn, etc.) based on the site name.
  • Easy to install as an appliance solution or can be deployed as a virtual software version.
  • 64-bit system architecture for Appliance and virtual version.
  • Complete Email Archive: Stores all incoming and outgoing emails on your hard drive.

– Technical information.

  •  Vulnerability scanner
  • Powerful 64-bit hardware virtual appliances.
  • Virtual 64-bit Hyper-V, ESXi, VMware and Linux ISO.
  • Support for high-power 64-bit multi-core CPUs
  • All models come with a full-size hard drive. Minimum size is 300 GB. Larger models come with an SSD for increased speed.
  • In many competitors, you only get 32/64GB flash and only the larger models support hard drives, but they are very expensive.
  • It is not limited to the ASIC framework, but to the actual Linux server system, allowing for full future upgrades.
  • It can be placed in any network environment, bridging the gap between the master router and the network to be protected.
  • DMZ management on the third network card

– Low-cost UTM device.

The SecPoint Unified Threat Management (UTM) appliance, known as SecPoint Protector, offers the following benefits to help ensure the security of your network:

Content Filtering, Wi-Fi Defender, Next-Generation Web Filtering, Antivirus, Antispam, VPN, Firewall Device, and Firewall Features.

It works on the school of thought that the less harmful malware can get into your system, the less likely it is to be compromised.

SecPoint Protector is “unified” in the sense that it offers services that traditionally stand alone on a single device. People generally use their firewall, antivirus, and Wi-Fi security solutions separately.

Protector is the best option because all of these services can work together to combat common online threats.

Each feature and service of this UTM device is well coordinated to achieve its objectives. There are some security programs that tend to slow down your computer if you run them all at the same time.

There will also be times when your firewall software will insist on becoming your antivirus and antispam provider, causing problems with your existing antivirus and antispam solutions.

You won't face such difficulties with SecPoint Protector's UTM protection system. Each software and application within this device has been specifically designed to work together and individually target the threats they need to eliminate without interfering with each other.

This is important because it helps reduce the risk of system resource hogging by competing security programs. UTM is the perfect solution when it comes to managing your defense applications and security measures.

Furthermore, while SecPoint is neither the first nor the last UTM device provider, they are even better than their closest competitors simply because they handle threats in a more specialized way.

Instead of a firewall doubling as an antivirus or vice versa, SecPoint Protector handles threats one at a time, so you're assured of premium-level, concentrated protection that leaves not a single drop of spam, viruses, botnets, worms, Trojans, spyware, and other malware to invade your system and turn it upside down.

Most companies try to do everything they can, attempting to do hundreds of things at once, but unable to master any of them. Meanwhile, SecPoint specializes in dealing with each of the latest threats, so you can rest assured of a quality software defense that's fully focused.

– High availability.

Automatic heartbeat synchronization for high availability.

Connect more protection units for maximum stability and security.

If one unit fails, the other unit can automatically take over as the master unit.

– Antivirus.

  1. Multiple antivirus scanning providers running
  2. Watch the Protector UTM appliance video: 3 antivirus engines running.
  3. Scan your emails with Kaspersky, ESET, and ClamAV.
  4. Get the best Ant antivirus scan for inbound and outbound email.

ESET and Kaspersky are among the leading commercial antivirus providers. When combined with the best open-source antivirus provider, ClamAV, they offer customers the best security check for viruses.

You can enable all three scanning providers at the same time to ensure all your incoming and outgoing email is free of viruses, malware, spyware, or worms. It's recommended to run all three providers simultaneously.

It's easy to enable all 3x antivirus scanners at once: upload the license keys or enter the key code. Once activated, it only takes a few clicks.

The antivirus scan will be performed automatically.

You can also run open source ClamAV if you don't want the additional cost of commercial antivirus vendors.


– Detailed features:

  • Protection against email threats.

Protector is a unified threat management solution with full-featured email threat protection. It can stop viruses, Trojans, spyware, and other malware. Integrated with ESET and Kaspersky Anti-Virus engines, SecPoint provides the best virus protection.

  • Integrated mail server.

Protector comes with a fully loaded email server, so you can save costs compared to your local email server. IMAP/Webmail/POP3 support: multi-layered email protection.

  1. Deploy Protector UTM Firewall as a Microsoft Hyper-V 2.0 or 3.0 image.
  2. Works for Hyper-V 2008 and earlier. Also works for Hyper-V 2012 R2 and later.
  3. Protector Firewall includes Wireguard VPN with IPsec 0 3des-md5 and LAN VPN Client with PPTP, L2TP IPsec /
  4. Integration with Microsoft Active Directory.
  5. Better cybersecurity protection for your entire network.
  6. Includes graphical user interface and live chat support.
  7. No backdoors – No data collection – All data stored at the customer site.
  8. 24/7 Live Chat Support.

  • Anti-Spam.

With Advanced Anti-Spam, you get the latest in comprehensive scanning. You can easily release emails from quarantine and view email content.

  • Captive Portal

SecPoint is working in partnership with WifiGem to offer the WifiGem captive portal as an add-on to SecPoint Protector.

With WifiGem, you can easily create your own guest network using one of the available network schemes and use Protector to filter and prioritize internet traffic from devices connected to the WifiGem captive portal. Pre-authorized accounts or social media logins.

  1. Account validity based on expiration date/time/downloads.
  2. Redirect after login.
  3. Multiple devices connected.
  4. Automatic logout after timeout.
  5. All parameters customizable.
  6. Transparent or non-transparent proxy mode.
  7. Supported HTTP and HTTPS protocols.
  8. Usage statistics.
  9. Compatible with web filter.

Request a quote

By clicking "Submit," you agree to allow Software.com.br to contact you using the information provided to send quotes and communications related to your order. For more details on how we protect and use your data, please see our Privacy Policy. Privacy Policy and Terms of Use

Related products

Serv-U FTP software allows for remote file transfer. FTP, short for File Transfer Protocol, is a very fast and efficient way to transfer files and is currently one of the most widely used on the Internet.

Main features

  • File transfer via FTP and FTPS;
  • Fast and easy mobile and web file transfers;
  • Transfer multiple large files with ease;
  • Easy administration and management of file transfers;
  • The secure gateway helps prevent data from being stored on DMZ networks;
  • Easily manage file transfer settings and permissions.


Kiwi Syslog software receives, logs, displays, forwards, and alerts syslog, SNMP trap, and Windows event log messages from devices such as routers, switches, Linux and Unix hosts, and Windows servers.

Centralize and simplify log message management across network devices and servers

Main features

  • Centrally manage Syslog messages, SNMP traps, and Windows event logs;
  • Receive real-time alerts based on critical events;
  • Automatically respond to Syslog messages;
  • Store and archive records to aid regulatory compliance;
  • View Syslog data anywhere with secure web access.


Invicti protects all websites, web applications, and APIs. Even if you have thousands of them.


Category

Manufacturer

Clearswift SECURE Email Gateway

Manufacturer

By clicking "Submit," you agree to allow Software.com.br to contact you using the information provided to send quotes and communications related to your order. For more details on how we protect and use your data, please see our Privacy Policy. Privacy Policy and Terms of Use

en_US