SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Introducing Kerio Control
Unified Threat Management Solution




Svijet komunikacija
info@svijetkomunikacija.hr
Overview
Comprehensive Unified Security with Kerio Control

Firewall                   Content filter            VPN
• Deep packet inspection   • Integrated anti-virus   • VPN Client for
• WAN Fail-over            • P2P Network Blocker     Windows, Mac, Linux
• Load Balancer            • URL filter              • Unlimited Site-to-Site
• Bandwidth Limiter        • Attachment filter       tunnels
• AD authentication        • StaR Reporting
• IPS/IDS
Kerio IDS/IPS
Unified Threat Management




Quick Definitions
• Intrusion Detection System
• Intrusion Prevention System
Kerio IDS/IPS
Business Benefits of UTM




•   Defends against known attacks and provides
    awareness and management of evolving security
    threats
•   Prevents information leakage and network update
    errors
•   Provides data about intrusion attempts
•   Easy to deploy
Kerio IDS/IPS
Unified Threat Management




•   Based on industry standard Snort technology, Kerio Control’s
    IDS/IPS classifies and stops attacks against servers,
    applications, clients and infrastructure components.
•   Kerio Control continuously updates the rules to keep them
    up-to-date with current threats
•   Integrates Blacklists that can block a range of threats
Kerio IDS/IPS
Unified Threat Management




How it works:
• Standalone process for IT administrators
• Takes advantage of multiple cores
• Separate kernel driver
• Sees packets “before" they touch the firewall
• Block threats between internet and trusted
Enhanced Features
Mac Address Filter:
• Works on one or more Ethernet/WiFi interfaces
• Block or permit traffic to a set of MAC addresses

DHCP:
• DHCP server automatic configuration


Multiple IP address’s per Adapter
• Associate multiple IP addresses with a single network
   adapter
• On SW appliance, IT administrators may edit the IP
   addresses through the boot screen
Kerio StaR Monitors web traffic




Identify Internet abuse. Learn how users spend their time
on the Internet.
• Provides trend reports on sites visited
• Web content categories
• Protocols used
• Bandwidth usage
Reports on Network Traffic




Who spends the most time browsing the web? Click and
see.
Monitor web traffic
New Web Administration




Modern, fresh, AJAX-based web admin
Straightforward administration of all firewall policies
Works with Internet Explorer, Firefox, Safari…
Enhanced Web Administration
Newly Added
• Look and feel of a
  true desktop
  application, making
  the enforcement of
  sophisticated
  network policies a
  snap for IT
  administrators
• Advanced options
  and Logs
New Integrated Antivirus
• Introducing new antivirus Sophos in Kerio Control 7
• Smooth transition from administration point of view
Licensing & Pricing
New User Definition
• A user is an individual with login access to Kerio Control and its
  services.
• A user can connect up to 5 devices (IP addresses)

Pricing
                             Server License        5-User   Subscription
                             (includes 5-users)   Add-ons    Renewal
Kerio Control                      $255            $120        30%
Kerio Control w/ Sophos AV         $306            $144        30%
Kerio Web Filter                   $100            $50         30%
Kerio’s Firewall Software Appliance

Security of a special purpose appliance

• No exploitable/vulnerable system services
• No conflicting applications
• Easy to install and deploy
• Single purpose operating system optimized for performance
VMware Virtual Appliance
Kerio Control + VMware
• Run multiple appliances on the same hardware
• Move the firewall to another server in minutes
• Add network adapters without touching the hardware
• Add security to existing network without adding hardware
Localizations




English    Italian      Croatian    Slovak
Dutch      Portuguese   Czech
French     Swedish      Hungarian
German     Spanish      Polish
Japanese   Chinese      Russian
Demonstration
Thank You




Svijet komunikacija
info@svijetkomunikacija.hr

Weitere ähnliche Inhalte

Was ist angesagt?

Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Ricardo Resnik
 
Cross selling 5
Cross selling 5Cross selling 5
Cross selling 5Sen Nathan
 
Internet Security in corporate environment
 Internet Security in corporate environment Internet Security in corporate environment
Internet Security in corporate environmentMASIT MACEDONIA
 
What's new in zimbra 8 presentation
What's new in zimbra 8 presentationWhat's new in zimbra 8 presentation
What's new in zimbra 8 presentationsolarisyourep
 
Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517Zscaler
 
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 TorontoF5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Torontopatmisasi
 
Sierraware browser isolation
Sierraware browser isolationSierraware browser isolation
Sierraware browser isolationSierraware
 
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...Precisely
 
Symantec Web Security Solutions
Symantec Web Security SolutionsSymantec Web Security Solutions
Symantec Web Security SolutionsSymantec
 
Measure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityMeasure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityIxia
 
Cyberoam ssl vpn_management_guide
Cyberoam ssl vpn_management_guideCyberoam ssl vpn_management_guide
Cyberoam ssl vpn_management_guidesupport_cyberoam
 
FixNix vCISO CyberSecurity Network Security for Covid91
FixNix vCISO CyberSecurity Network Security for Covid91FixNix vCISO CyberSecurity Network Security for Covid91
FixNix vCISO CyberSecurity Network Security for Covid91Shanmugavel Sankaran
 
How to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation FirewallsHow to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation FirewallsIxia
 
Measuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyMeasuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyIxia
 
Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Wen-Pai Lu
 
Firewall Testing Methodology
Firewall Testing MethodologyFirewall Testing Methodology
Firewall Testing MethodologyIxia
 

Was ist angesagt? (20)

Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3
 
Cross selling 5
Cross selling 5Cross selling 5
Cross selling 5
 
Internet Security in corporate environment
 Internet Security in corporate environment Internet Security in corporate environment
Internet Security in corporate environment
 
What's new in zimbra 8 presentation
What's new in zimbra 8 presentationWhat's new in zimbra 8 presentation
What's new in zimbra 8 presentation
 
Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517
 
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 TorontoF5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
 
Sierraware browser isolation
Sierraware browser isolationSierraware browser isolation
Sierraware browser isolation
 
F5 Web Application Security
F5 Web Application SecurityF5 Web Application Security
F5 Web Application Security
 
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
 
Symantec Web Security Solutions
Symantec Web Security SolutionsSymantec Web Security Solutions
Symantec Web Security Solutions
 
Measure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityMeasure Network Performance, Security and Stability
Measure Network Performance, Security and Stability
 
Cyberoam ssl vpn_management_guide
Cyberoam ssl vpn_management_guideCyberoam ssl vpn_management_guide
Cyberoam ssl vpn_management_guide
 
checkpoint
checkpointcheckpoint
checkpoint
 
FixNix vCISO CyberSecurity Network Security for Covid91
FixNix vCISO CyberSecurity Network Security for Covid91FixNix vCISO CyberSecurity Network Security for Covid91
FixNix vCISO CyberSecurity Network Security for Covid91
 
How to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation FirewallsHow to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation Firewalls
 
Measuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyMeasuring Private Cloud Resiliency
Measuring Private Cloud Resiliency
 
Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2
 
Novinky F5
Novinky F5Novinky F5
Novinky F5
 
Azure F5 Solutions
Azure F5 SolutionsAzure F5 Solutions
Azure F5 Solutions
 
Firewall Testing Methodology
Firewall Testing MethodologyFirewall Testing Methodology
Firewall Testing Methodology
 

Ähnlich wie Comprehensive UTM Kerio Control

Kwf 6 7 Newfeatures En
Kwf 6 7 Newfeatures EnKwf 6 7 Newfeatures En
Kwf 6 7 Newfeatures Ensrrm7
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityPrecisely
 
Firewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsFirewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsAnthony Daniel
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...solarisyourep
 
Cybersecurity for Board.pptx
Cybersecurity for Board.pptxCybersecurity for Board.pptx
Cybersecurity for Board.pptxSandeepAgrawal98
 
Sophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Benelux
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hackingDesmond Devendran
 
Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2fadielmoussa
 
Getting Started With AWS Security
Getting Started With AWS SecurityGetting Started With AWS Security
Getting Started With AWS SecurityAmazon Web Services
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1PROIDEA
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfImamBahrudin5
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server securityxband
 
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha Schneider Electric
 
HCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch SalzburgHCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch SalzburgDNUG e.V.
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...Amazon Web Services
 
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale
 

Ähnlich wie Comprehensive UTM Kerio Control (20)

Kwf 6 7 Newfeatures En
Kwf 6 7 Newfeatures EnKwf 6 7 Newfeatures En
Kwf 6 7 Newfeatures En
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
 
CipherGraph Cloud VPN
CipherGraph Cloud VPNCipherGraph Cloud VPN
CipherGraph Cloud VPN
 
Firewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsFirewalls Security – Features and Benefits
Firewalls Security – Features and Benefits
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...
 
Cybersecurity for Board.pptx
Cybersecurity for Board.pptxCybersecurity for Board.pptx
Cybersecurity for Board.pptx
 
CursoFirewallWG_2022.pdf
CursoFirewallWG_2022.pdfCursoFirewallWG_2022.pdf
CursoFirewallWG_2022.pdf
 
Sophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypes
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
 
Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2
 
Getting Started With AWS Security
Getting Started With AWS SecurityGetting Started With AWS Security
Getting Started With AWS Security
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
 
HCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch SalzburgHCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch Salzburg
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
 
Sophos XG Firewall
Sophos XG FirewallSophos XG Firewall
Sophos XG Firewall
 
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the Cloud
 

Mehr von rkoscak

PaperCut NG katalog, Hrvatska verzija
PaperCut NG katalog, Hrvatska verzijaPaperCut NG katalog, Hrvatska verzija
PaperCut NG katalog, Hrvatska verzijarkoscak
 
PaperCut Fact Sheet Overview
PaperCut Fact Sheet OverviewPaperCut Fact Sheet Overview
PaperCut Fact Sheet Overviewrkoscak
 
PaperCut Solutions For Education
PaperCut Solutions For EducationPaperCut Solutions For Education
PaperCut Solutions For Educationrkoscak
 
PaperCut Top 10 Reasons
PaperCut Top 10 ReasonsPaperCut Top 10 Reasons
PaperCut Top 10 Reasonsrkoscak
 
Kerio Connect Vs Microsoft Exchange
Kerio Connect Vs Microsoft ExchangeKerio Connect Vs Microsoft Exchange
Kerio Connect Vs Microsoft Exchangerkoscak
 
Kerio Connect 7.4 Datasheet
Kerio Connect 7.4 DatasheetKerio Connect 7.4 Datasheet
Kerio Connect 7.4 Datasheetrkoscak
 
Kerio Operator Overview
Kerio Operator OverviewKerio Operator Overview
Kerio Operator Overviewrkoscak
 
Kerio Connect 7 Overview
Kerio Connect 7 OverviewKerio Connect 7 Overview
Kerio Connect 7 Overviewrkoscak
 

Mehr von rkoscak (8)

PaperCut NG katalog, Hrvatska verzija
PaperCut NG katalog, Hrvatska verzijaPaperCut NG katalog, Hrvatska verzija
PaperCut NG katalog, Hrvatska verzija
 
PaperCut Fact Sheet Overview
PaperCut Fact Sheet OverviewPaperCut Fact Sheet Overview
PaperCut Fact Sheet Overview
 
PaperCut Solutions For Education
PaperCut Solutions For EducationPaperCut Solutions For Education
PaperCut Solutions For Education
 
PaperCut Top 10 Reasons
PaperCut Top 10 ReasonsPaperCut Top 10 Reasons
PaperCut Top 10 Reasons
 
Kerio Connect Vs Microsoft Exchange
Kerio Connect Vs Microsoft ExchangeKerio Connect Vs Microsoft Exchange
Kerio Connect Vs Microsoft Exchange
 
Kerio Connect 7.4 Datasheet
Kerio Connect 7.4 DatasheetKerio Connect 7.4 Datasheet
Kerio Connect 7.4 Datasheet
 
Kerio Operator Overview
Kerio Operator OverviewKerio Operator Overview
Kerio Operator Overview
 
Kerio Connect 7 Overview
Kerio Connect 7 OverviewKerio Connect 7 Overview
Kerio Connect 7 Overview
 

Comprehensive UTM Kerio Control

  • 1. Introducing Kerio Control Unified Threat Management Solution Svijet komunikacija info@svijetkomunikacija.hr
  • 2. Overview Comprehensive Unified Security with Kerio Control Firewall Content filter VPN • Deep packet inspection • Integrated anti-virus • VPN Client for • WAN Fail-over • P2P Network Blocker Windows, Mac, Linux • Load Balancer • URL filter • Unlimited Site-to-Site • Bandwidth Limiter • Attachment filter tunnels • AD authentication • StaR Reporting • IPS/IDS
  • 3. Kerio IDS/IPS Unified Threat Management Quick Definitions • Intrusion Detection System • Intrusion Prevention System
  • 4. Kerio IDS/IPS Business Benefits of UTM • Defends against known attacks and provides awareness and management of evolving security threats • Prevents information leakage and network update errors • Provides data about intrusion attempts • Easy to deploy
  • 5. Kerio IDS/IPS Unified Threat Management • Based on industry standard Snort technology, Kerio Control’s IDS/IPS classifies and stops attacks against servers, applications, clients and infrastructure components. • Kerio Control continuously updates the rules to keep them up-to-date with current threats • Integrates Blacklists that can block a range of threats
  • 6. Kerio IDS/IPS Unified Threat Management How it works: • Standalone process for IT administrators • Takes advantage of multiple cores • Separate kernel driver • Sees packets “before" they touch the firewall • Block threats between internet and trusted
  • 7. Enhanced Features Mac Address Filter: • Works on one or more Ethernet/WiFi interfaces • Block or permit traffic to a set of MAC addresses DHCP: • DHCP server automatic configuration Multiple IP address’s per Adapter • Associate multiple IP addresses with a single network adapter • On SW appliance, IT administrators may edit the IP addresses through the boot screen
  • 8. Kerio StaR Monitors web traffic Identify Internet abuse. Learn how users spend their time on the Internet. • Provides trend reports on sites visited • Web content categories • Protocols used • Bandwidth usage
  • 9. Reports on Network Traffic Who spends the most time browsing the web? Click and see.
  • 11. New Web Administration Modern, fresh, AJAX-based web admin Straightforward administration of all firewall policies Works with Internet Explorer, Firefox, Safari…
  • 12. Enhanced Web Administration Newly Added • Look and feel of a true desktop application, making the enforcement of sophisticated network policies a snap for IT administrators • Advanced options and Logs
  • 13. New Integrated Antivirus • Introducing new antivirus Sophos in Kerio Control 7 • Smooth transition from administration point of view
  • 14. Licensing & Pricing New User Definition • A user is an individual with login access to Kerio Control and its services. • A user can connect up to 5 devices (IP addresses) Pricing Server License 5-User Subscription (includes 5-users) Add-ons Renewal Kerio Control $255 $120 30% Kerio Control w/ Sophos AV $306 $144 30% Kerio Web Filter $100 $50 30%
  • 15. Kerio’s Firewall Software Appliance Security of a special purpose appliance • No exploitable/vulnerable system services • No conflicting applications • Easy to install and deploy • Single purpose operating system optimized for performance
  • 16. VMware Virtual Appliance Kerio Control + VMware • Run multiple appliances on the same hardware • Move the firewall to another server in minutes • Add network adapters without touching the hardware • Add security to existing network without adding hardware
  • 17. Localizations English Italian Croatian Slovak Dutch Portuguese Czech French Swedish Hungarian German Spanish Polish Japanese Chinese Russian

Hinweis der Redaktion

  1. Kerio Control is a new unified threat management server solution and software appliance offering network administrators complete network security and a wealth of tools to manage user access and optimize performance. Equipped with an embedded IDS/IPS engine, Kerio Control provides comprehensive management of rapidly evolving security threats.Kerio Control is a software-based security gateway that incorporates a stateful firewall, IPS/IDS, comprehensive content filter, and VPN. This combination provides superior protection at the network perimeter while allowing secure access to remote users and systems.
  2. An integrated three-level threat rating system allows a graduated response to each incident based on the severity of the threat. The signature database used for traffic analysis is enhanced by the included IP blacklists.Custom hardware supports Keyboard Video Mouse for initial setup and admin accessMinimum requirements for system: 2 GB RAM, 3GB HDD
  3. An integrated three-level threat rating system allows a graduated response to each incident based on the severity of the threat. The signature database used for traffic analysis is enhanced by the included IP blacklists.Custom hardware supports Keyboard Video Mouse for initial setup and admin accessMinimum requirements for system: 2 GB RAM, 3GB HDD
  4. An integrated three-level threat rating system allows a graduated response to each incident based on the severity of the threat. The signature database used for traffic analysis is enhanced by the included IP blacklists.Custom hardware supports Keyboard Video Mouse for initial setup and admin accessMinimum requirements for system: 2 GB RAM, 3GB HDD
  5. An integrated three-level threat rating system allows a graduated response to each incident based on the severity of the threat. The signature database used for traffic analysis is enhanced by the included IP blacklists.Custom hardware supports Keyboard Video Mouse for initial setup and admin accessMinimum requirements for system: 2 GB RAM, 3GB HDD
  6. Filtering
  7. Each user’s activity history is stored in the StaR database which makes it really easy for IT managers and management to find out what users on the organization’s network are doing throughout day.It is accessible from any browser, giving managers instant insight into the web behavior of every single employee or user in their network. The database-driven Kerio StaR gives administrators useful trend reports based on historic data, allowing them to view and inspect changing usage patterns and take swift action on any emerging network abuse.
  8. Each user’s activity history is stored in the StaR database which makes it really easy for IT managers and management to find out what users on the organization’s network are doing throughout day.
  9. Can drill down to individual users and Each user’s activity history is stored in the StaR database which enables a view of each individual
  10. The new web administration is fast. It looks just like a traditional application but you can now administer most of the settings through any web browser. This includes user management and domain authentication, traffic policies, interfaces, and the Web Filter policies.
  11. Kerio Control comes with an embedded high-performance Sophos anti-virus engine that provides the option to scan to all inbound and outbound web, email and FTP traffic for malware. In the virus scanning business since 1992, Sophos has a strong technology portfolio and global business model that mirrors Kerio's own. Their scan engine offers extreme performance and includes the following technologies: - genotype virus detection technology- decision caching- pattern matching- emulation- dynamic code analysis- heuristics
  12. New Licensing “… A user is defined as an individual with login access to Kerio Control and its services. An individual user can connect from as many as five devices represented by an IP address, including VPN clients.If an individual user needs to connect from more than five devices, an additional user license will be required to support the additional devices. …”* 1 year of version upgrades.* 1 year of email and telephone access to technical support.* Kerio VPN client
  13. The Kerio Control 7 software appliance can turn any PC into a dedicated UTM appliance using the ISO image, while the specially designed virtual appliance for VMware can be easily imported into existing virtual environments to maximize ROI on existing IT equipment. No locally installed applications like Anti-virus that can conflict with the firewall or take system resources.
  14. We’ve made sure that Kerio Control Firewall Software Appliance will work for customers with global presence. All components of Kerio ControlFirewall Software Appliance including the StaR report module and VPN clients are available in 16 languages.