Introducing Quick Heal Terminator Terminate gateway-level threats with future-ready security Quick Heal TERMINATOR Unified Threat Management Solution • A solution that emerged out of the need to.

Download Report

Transcript Introducing Quick Heal Terminator Terminate gateway-level threats with future-ready security Quick Heal TERMINATOR Unified Threat Management Solution • A solution that emerged out of the need to.

Introducing
Quick Heal Terminator
Terminate gateway-level threats
with future-ready security
Quick Heal TERMINATOR
Unified Threat Management Solution
•
A solution that emerged out of the need to stop blended and
insider threats and newer attack techniques that target the user
as the weakest link for corporate information systems.
•
Ability to perform multiple security functions in a single appliance
and managed through a single console.
•
A comprehensive solution.
•
Recent inception in network security industry since 2004.
•
The term Unified Threat Management (UTM) was originally
forged by IDC , a leading IT market research firm.
Why do SMBs need UTM?
Targeted Espionage
•
Target is intellectual property or operational data
•
Network shutdown due to bogus traffic
•
Commercially sensitive information leaks
•
High potential revenue per unit
Spear Phishing, Hacking, Backdoor Entry
•
Ability to act is targeted
•
Network Service disruption & degradation
•
Data pilferage| Medium revenue per unit
Why do SMBs need UTM?
Mass Internet Attacks – DOS, DDOS
•
Drive by exploits
•
Websites knocked online
•
Bandwidth, disk space or CPU time unavailable to
its intended users
Port Scan Infiltrations
•
Exposes open and/ or unprotected ports to criminals who can
gain access to networks
Wi-Fi Sniffing
•
Illegally capture and decode other people’s data
•
Gain Internet access unethically
Why do SMBs need UTM?
• Poor network security
• Competence being the best asset, one data leak
can ruin all that effort
• Repercussions to your credibility, reputation and finances
• Budget constraints to appoint experts
for IT security needs.
Typical attackers do not target
individuals or businesses – they
target vulnerabilities.
Every computer attached to the
Internet is a target.
Why do attackers want any and all
networked computers?
Any PC can be used as a
spam relay.
Any PC can be used as
an illegal file repository.
Any PC can help put a
foe out of business.
Any PC can host a
phishing site.
Quick Heal TERMINATOR
for ROBO/SOHO
Quick Heal TERMINATOR
for SME
Quick Heal TERMINATOR
for Enterprise
Internet
Firewall Inspection
Intrusion Prevention
URL Filtering
Users
Anti-Spam,
Anti-Malware
VPN
Remote Users
Network Security
Connectivity
Productivity
Quick Heal TERMINATOR
Features for
Robust Network Security
Firewall
Administrators can block or allow
access, for each protocol, to each
internal network, user and user group.
IDS/IPS
Prevents network from mass attacks
like DOS and DDOS so that the network
remains unaffected from remote and
sync flood attacks.
User Based Access Control
Restricts or authorizes Internet access
for users based on authentication
credentials.
Gateway Mail Protection
Scans inbound and outbound email
messages and email attachments.
AntiSpam scans and runs a series of
tests on inbound email messages.
Category-wise Web
Filtering
Prevent viewing inappropriate web
sites.
Content Filtering
Prevents download of specific files
and applications based on file
extensions.
Gateway Anti-Virus
protection provides another layer
augmenting existing desktop virus
solutions.
Active Directory/LDAP
Support
Automatically connects and syncs
with existing Active Directory/LDAP
and updates user base.
Quick Heal TERMINATOR
Features for
Seamless Connectivity
VPN
Provides the IT administrators
means for secure communications
with the company’s remote users
and for building secure site-to-site
connections.
Bandwidth Manager
Simplifies the IT administrator’s task
of allocating bandwidth on the basis
of usage among users and user
groups and saves the bandwidth
cost of the company as you spend
only on what you need.
IPv6 Enabled
The appliance is ready to support
IPv6 based networks.
Load Balancing
Allows multiple ISPs to be used in a
network simultaneously enabling
users to utilize the same gateway
irrespective of the ISP lines.
Automatic Link Failover
Automatically diverts the data traffic
from inactive ISP to active ISP lines
in case any of the ISP lines fail to
perform.
Multiple LAN/WAN/DMZ
Zone Configuration
Flexible interfaces which can be
configured for local network, Internet
and DMZ.
Quick Heal TERMINATOR
Features for
Enhanced Productivity
Detailed Reports
Provides on appliance extensive
reporting of top websites accessed,
policy breaches and
bandwidth usage.
Role based Administrator
Support
Different levels of access to
TERMINATOR console depending on
the role of the Administrator.
Log Viewer
Allows system admin to see all the
events happening on the appliance viz.
log in any changes made to settings
User Friendly User Interface
User Interface Graphical Dashboard
gives immediate status of critical
security situations that need
immediate attention.
SMS and Email
Notifications
Allows notifications to be sent to
configured email addresses and
numbers. These notifications would
alert the network administrator of
critical network events such as
detection of viruses, intrusions,
update notifications, license expiry
date, etc.
Employee Productivity
Role based access control.
Bandwidth Manager
Simplifies the IT administrator’s task
of allocating bandwidth on the basis
of usage among users and user
groups and saves the bandwidth
cost of the company as you spend
only on what you need.
IT Policy Management
On device comprehensive logging
and reporting. User friendly webbased configuration.
Quick Heal TERMINATOR
Streamlined Performance, Scalability to
meet growth & simplified Management
Business Benefits
Safe working environment, Employee
Productivity, Cost- effective bundled
solution, Regulatory Compliance
Financial Benefits
Consolidated Cost-effective Solution,
Optimum use of IT Resources
Technological Benefits
Cumulative Network security, Plug-
and-Play Solution, Extensive Support
for your Quick Heal TERMINATOR
No matter how big or complex,
the enterprise network is, with:
Quick Heal TERMINATOR
Managing security is made simple.