2. Overview
Comprehensive Unified Security with Kerio Control
Firewall Content filter VPN
• Deep packet inspection • Integrated anti-virus • VPN Client for
• WAN Fail-over • P2P Network Blocker Windows, Mac, Linux
• Load Balancer • URL filter • Unlimited Site-to-Site
• Bandwidth Limiter • Attachment filter tunnels
• AD authentication • StaR Reporting
• IPS/IDS
3. Kerio IDS/IPS
Unified Threat Management
Quick Definitions
• Intrusion Detection System
• Intrusion Prevention System
4. Kerio IDS/IPS
Business Benefits of UTM
• Defends against known attacks and provides
awareness and management of evolving security
threats
• Prevents information leakage and network update
errors
• Provides data about intrusion attempts
• Easy to deploy
5. Kerio IDS/IPS
Unified Threat Management
• Based on industry standard Snort technology, Kerio Control’s
IDS/IPS classifies and stops attacks against servers,
applications, clients and infrastructure components.
• Kerio Control continuously updates the rules to keep them
up-to-date with current threats
• Integrates Blacklists that can block a range of threats
6. Kerio IDS/IPS
Unified Threat Management
How it works:
• Standalone process for IT administrators
• Takes advantage of multiple cores
• Separate kernel driver
• Sees packets “before" they touch the firewall
• Block threats between internet and trusted
7. Enhanced Features
Mac Address Filter:
• Works on one or more Ethernet/WiFi interfaces
• Block or permit traffic to a set of MAC addresses
DHCP:
• DHCP server automatic configuration
Multiple IP address’s per Adapter
• Associate multiple IP addresses with a single network
adapter
• On SW appliance, IT administrators may edit the IP
addresses through the boot screen
8. Kerio StaR Monitors web traffic
Identify Internet abuse. Learn how users spend their time
on the Internet.
• Provides trend reports on sites visited
• Web content categories
• Protocols used
• Bandwidth usage
9. Reports on Network Traffic
Who spends the most time browsing the web? Click and
see.
11. New Web Administration
Modern, fresh, AJAX-based web admin
Straightforward administration of all firewall policies
Works with Internet Explorer, Firefox, Safari…
12. Enhanced Web Administration
Newly Added
• Look and feel of a
true desktop
application, making
the enforcement of
sophisticated
network policies a
snap for IT
administrators
• Advanced options
and Logs
13. New Integrated Antivirus
• Introducing new antivirus Sophos in Kerio Control 7
• Smooth transition from administration point of view
14. Licensing & Pricing
New User Definition
• A user is an individual with login access to Kerio Control and its
services.
• A user can connect up to 5 devices (IP addresses)
Pricing
Server License 5-User Subscription
(includes 5-users) Add-ons Renewal
Kerio Control $255 $120 30%
Kerio Control w/ Sophos AV $306 $144 30%
Kerio Web Filter $100 $50 30%
15. Kerio’s Firewall Software Appliance
Security of a special purpose appliance
• No exploitable/vulnerable system services
• No conflicting applications
• Easy to install and deploy
• Single purpose operating system optimized for performance
16. VMware Virtual Appliance
Kerio Control + VMware
• Run multiple appliances on the same hardware
• Move the firewall to another server in minutes
• Add network adapters without touching the hardware
• Add security to existing network without adding hardware
17. Localizations
English Italian Croatian Slovak
Dutch Portuguese Czech
French Swedish Hungarian
German Spanish Polish
Japanese Chinese Russian
Kerio Control is a new unified threat management server solution and software appliance offering network administrators complete network security and a wealth of tools to manage user access and optimize performance. Equipped with an embedded IDS/IPS engine, Kerio Control provides comprehensive management of rapidly evolving security threats.Kerio Control is a software-based security gateway that incorporates a stateful firewall, IPS/IDS, comprehensive content filter, and VPN. This combination provides superior protection at the network perimeter while allowing secure access to remote users and systems.
An integrated three-level threat rating system allows a graduated response to each incident based on the severity of the threat. The signature database used for traffic analysis is enhanced by the included IP blacklists.Custom hardware supports Keyboard Video Mouse for initial setup and admin accessMinimum requirements for system: 2 GB RAM, 3GB HDD
An integrated three-level threat rating system allows a graduated response to each incident based on the severity of the threat. The signature database used for traffic analysis is enhanced by the included IP blacklists.Custom hardware supports Keyboard Video Mouse for initial setup and admin accessMinimum requirements for system: 2 GB RAM, 3GB HDD
An integrated three-level threat rating system allows a graduated response to each incident based on the severity of the threat. The signature database used for traffic analysis is enhanced by the included IP blacklists.Custom hardware supports Keyboard Video Mouse for initial setup and admin accessMinimum requirements for system: 2 GB RAM, 3GB HDD
An integrated three-level threat rating system allows a graduated response to each incident based on the severity of the threat. The signature database used for traffic analysis is enhanced by the included IP blacklists.Custom hardware supports Keyboard Video Mouse for initial setup and admin accessMinimum requirements for system: 2 GB RAM, 3GB HDD
Filtering
Each user’s activity history is stored in the StaR database which makes it really easy for IT managers and management to find out what users on the organization’s network are doing throughout day.It is accessible from any browser, giving managers instant insight into the web behavior of every single employee or user in their network. The database-driven Kerio StaR gives administrators useful trend reports based on historic data, allowing them to view and inspect changing usage patterns and take swift action on any emerging network abuse.
Each user’s activity history is stored in the StaR database which makes it really easy for IT managers and management to find out what users on the organization’s network are doing throughout day.
Can drill down to individual users and Each user’s activity history is stored in the StaR database which enables a view of each individual
The new web administration is fast. It looks just like a traditional application but you can now administer most of the settings through any web browser. This includes user management and domain authentication, traffic policies, interfaces, and the Web Filter policies.
Kerio Control comes with an embedded high-performance Sophos anti-virus engine that provides the option to scan to all inbound and outbound web, email and FTP traffic for malware. In the virus scanning business since 1992, Sophos has a strong technology portfolio and global business model that mirrors Kerio's own. Their scan engine offers extreme performance and includes the following technologies: - genotype virus detection technology- decision caching- pattern matching- emulation- dynamic code analysis- heuristics
New Licensing “… A user is defined as an individual with login access to Kerio Control and its services. An individual user can connect from as many as five devices represented by an IP address, including VPN clients.If an individual user needs to connect from more than five devices, an additional user license will be required to support the additional devices. …”* 1 year of version upgrades.* 1 year of email and telephone access to technical support.* Kerio VPN client
The Kerio Control 7 software appliance can turn any PC into a dedicated UTM appliance using the ISO image, while the specially designed virtual appliance for VMware can be easily imported into existing virtual environments to maximize ROI on existing IT equipment. No locally installed applications like Anti-virus that can conflict with the firewall or take system resources.
We’ve made sure that Kerio Control Firewall Software Appliance will work for customers with global presence. All components of Kerio ControlFirewall Software Appliance including the StaR report module and VPN clients are available in 16 languages.