This promotion is for Rewards members only. To take advantage of exclusive offers like these, join Office Depot® OfficeMax® Rewards Everything now!
The ProSecure UTM series of all-in-one gateway security appliances combine best-of-breed security technologies and Stream Scanning technology to protect businesses against today's web, email, and network threats. Malware hosted on web pages, phishing attacks, spam, virus infected emails, hackers, denial-of-service attacks, and other threats are now all part of a regular repertoire of sophisticated blended attacks that bypass traditional firewalls with ease. Growing businesses have been the ones most seriously affected as they, unlike their enterprise counterparts, often lack the time and resources to fully harden and secure their networks from these threats.ProSecure Unified Threat Management (UTM) appliances combine performance with comprehensive security coverage. Stream Scanning technology enables the use of an extensive virus and malware database while maintaining a high level of throughput and minimizing scanning-induced latency. The flexible modular software design architecture leverages Stream Scanning technology to scan files and data streams up to 5x faster than conventional methods. This architecture, combined with best-of-breed hybrid in-the-cloud web filter and anti-spam technologies along with proven firewall and VPN functionality, form the ideal growing business gateway security solution.Given the high performance requirements of scanning latency sensitive web traffic, incorporating enterprise-grade security software technologies onto traditional all-in-one platforms has been a very difficult task. That is why the ProSecure UTM features Stream Scanning technology which analyzes data streams as they enter the network. The ProSecure Stream Scanning approach is many times faster than that of more traditional batchbased scanning methods where the entire file is buffered before it is scanned. Due to its nature, traditional batch-based scanning methods introduce latency to network traffic. While latency is more tolerable for email traffic, for large amounts of HTTP web traffic, such latency often slows web browsing to a crawl. All-in-one solutions in the past have tried to overcome the latency issue by minimizing the malware signature set, scanning only a handful of file types, or by avoiding web traffic scanning altogether. This approach exposes an entire vector of the network to malware-based.
|Encryption Standard||DES; 3DES; AES (128-bit); AES (192-bit); AES (256-bit); SHA-1; MD5; ARC4; RSA|
|Ethernet Technology||Gigabit Ethernet|
|Firewall Protection Supported||Malware Protection; Anti-phishing; Anti-spam; Email Anti-virus; Hacker Defense; Denial of Service (DoS); Web Content Filtering; Intrusion Prevention; URL Filtering; Instant Messenger Blocking; Cookies Blocking; IP Address Filtering; UDP Flood; Ping; MAC Address Blocking; Port Scan Detection; Content Filtering; Proxy Blocking; Keyword Filtering; Spoof Detection|
|Flash Memory||2 GB|
|form factor||Desktop; Rack-mountable|
|Input Voltage||110 V AC; 220 V AC|
|Number of Total Expansion Slots||2|
|Standard Memory||512 MB|
|Total Number of Ports||6|
|Virtualization||16000 x Concurrent Connection; 255 x 802.1Q VLAN Support; 10 x Site-to-Site VPN Tunnel; 5 x SSL VPN Tunnel|
|warranty length||limited lifetime|
|Weight (Approximate)||5.65 lb|
Thank you, you will now be redirected to comparisons.
Just a moment while we prepare the page
Check In-Store Availability