Previously simple firewall is a device used to set access policies (allow, prohibition) between the network partition or between the network and prevent a few simple attacks.
Today, there are many online threats:
Viruses, worms software (worms), spyware (spyware), malicious code (trojans, malware), donkeys information (phishing) ... spread online through websites, email, games, ... with incredible speed
Spam (spam) accounts for over 80% of e-mail sent over the network. Spam not only occupied resources are brought online many threats, including viruses, worms, spyware, trojans, malware, phishing and cause many problems for users
Denial of service (DoS) by sending a connection request or valid information but with the speed and how to make computers do not meet or have to spend all resources to handle and do it does not work normally, so the service also stalled
Attacks on the weaknesses and "holes" (bug) of the operating system, server services to exploit information, gain control, destructive, ... This attack made on the service connection should allow firewall usually can not be detected and prevented
The site content is not healthy, malicious spend money, time and user hides many other hazards
To perform such functions as traditional firewall on many large firms are solved using the plug-in module or external or third-party software. But not really high performance, cost becomes too high.
Firewall Unified Threat Management (UTM firewall) is designed to replace traditional firewall against the sum of the dangers.
Ability to handle large firewall
Unlimited number of users
Detection and prevention (IPS) attacks, unauthorized intrusions through vulnerability, operating system vulnerabilities, service, DoS attack prevention, ...
Scan for viruses and prevent the flow of web protocol (HTTP), email (SMTP, POP, IMAP), ftp (FTP), ...
Anti-spam (spam): stop with the list, sorting, relay server list, keywords, ...
Web content filtering by category, keyword, ...
Set up a scheduled policy: only access to server data during trading hours, just chatting outside working hours, ...
Virtual domains: virtual firewall divided into (virtual system), ...
Join our MailList system, you will receive the latest information on products, services and solutions, news, promotion and recruitment of companies Hop Thanh Thinh via email.