Do you know everything that happens in your company`s IT environment? Do you have control of the most accessed sites by employees? How is your network`s availability? Is your business always online?

In Brazil, 97% ¹ of the companies are connected to the Internet. A study on companies in Brazil, shows that 52%² of these companies have had their sensitive data stolen due malware attacks. This happens because as the Internet connection grows, the hackers attacks follow it. Companies may receive 247.400³ cyber attacks daily, beside the time taken to detect these attacks. Have you ever imagine if you could prevent these attacks through an efficient network management?

With Aker UTM - NGFW you can!

Aker raised the level of automation and created a true Digital Fortress to include a number of features in its NGFW Firewall that, in addition to preserving the network environment, enable the efficient management of data traffic. With Failover feature rules, exclusive of Aker UTM - NGFW, the solution automatically sets the priorities of the traffic on your network so that you can retain the services of your company always working.

Now, you can create multiple secure connections between headquarters and branch offices of its corporate network while reducing costs with dedicated links, establishing VPNs between Aker UTM - NGFW and others who support the OpenVPN standard. With this feature you can still balance the two VPNs traffic and set up safe routes automatically if the main Internet link is idle.

Meet the Aker UTM - NGFW and see what you will gain by acquiring this solution Unified Threat Management (UTM)!

(1) Source: Digital Convergence
(2) Source: Exame magazine
(3) Source: Economic Value SA

Protect your network with Aker UTM - NGFW

Our projects offer the best cost-benefit on the market!

Features

Check out the news from Aker UTM - NGFW!

Failover Rules

Let Aker UTM - NGFW automatically configure the priorities of the traffic on your network. With this feature, you can keep essential services running, such as ERP or payment system, and disable others, such as web users to access if the main Internet link is idle.

OpenVPN

Please connect to the corporate network securely, establish VPN between Aker UTM - NGFW and others that support this standard. With OpenVPN is still possible to balance the two VPNs traffic and set up safe routes automatically if the main Internet link is idle.

Smart Link Load Balancing

Keep your network running at peak performance, regardless the number of Internet links that are active. Aker Firewall 6.8 enables the Link Load Balancing by policy, offering four (4) different options: Link Failover, Percentage, connections and TCP Performance.

Detailed reports

Create custom security reports in a simply manner and without the need for programming! Improve your network and staff performance by identifying downloads, most visited sites, incoming flow and outgoing packets, users, among others options.

Proxy IMAP

Evite infecções através de arquivos maliciosos em anexos e mensagens de e-mail com uma camada adicional de proteção antivírus. O Aker UTM – NGFW ainda filtra anexos mesmo que a conexão do IMAP seja criptografada.

More robust hardware

The new Enterprise appliances for Aker Firewall UTM 6.8, offers the best settings equipped with 40 Giga Throughput, memory options up to 96 Gbytes and up to 64 network interfaces.

Authentication support for Citrix and Terminal Service environments

Control user access` profiles even though they are connected to the same Remote Terminal server and increase your network security.

Timeout connection

Optimize your network usage and customize the connection time for each application/service. Avoid the loss of connection to web services, databases and more.

Find out what you have to gain by purchasing this complete solution Digital Security!

Aker Firewall features.

Characteristics
  • Automated and centralized management
  • Easy installation and configuration
  • User-friendly interface
  • Complete security reports
  • Integration with third-party systems
  • Transparent mode (Bridge)
  • Link Aggregation
Major Benefits
  • High security, availability, flexibility and scalability
  • Fully adaptable to your business reality
  • The best cost-benefit on the market
  • High level support
  • Low maintenance cost
  • Increase productivity
  • Clientless Authentication (BYOD)
  • Quick and secure Wireless network access
  • No registration required
  • Less human intervention
  • Robust Hardware
Related Products