Protect your whole network from external threats and allow users to browse the Internet safely.
C&W Managed UTM protects users ́ Internet browsing by integrating services such as the protection of external access to the network and to the Internet, IPS, content filtering, VPNs, antiviruses, and antispam. The information is authenticated by comparison with the Active Directory. When defining or consolidating security policies, the company complies with the best security practices.
C&W Managed UTM provides our client access to information security management through a team of security experts that have obtained the most recognized credentials and certification of the industry. These experts will be available to support you in the diagnosis and resolution of security incidents as well as provide recommendations regarding the protection of your information assets.
C&W Managed UTM can be implemented both in the client’s premises and C&W’s Data centers, using either virtual or physical appliances, delivering the same standards and quality of service in any scenario.
Firewall: Application of security standards and policies that allow for filtering the incoming and outgoing traffic
Intrusion Detection and Prevention System (IPS): Implementation of security policies at an application level
Content filtering: Definition of filtering categories to manage users ́ permissions to access websites
VPNs: Configuration of Site-to-Site and SSL VPNs
Antispam: Filtering and analysis of incoming emails
Traffic Shaping: Allows the use of different bandwidth capacities for different users and applications
Antivirus: Detection of threats to ensure safe browsing for the company ́s users
Integration with the Active Directory.
Support 24/7, 365 days a year
Access to state-of-the-art infrastructure with no upfront investment
Monthly reports on the service
Fully managed turnkey solution
Management of the use of the Internet through the implementation of content-filtering policies
Service Level Agreement (SLA)
Real-time access to the monitoring of the network security
Physical or virtual solution that can be implemented in the client’s Data Center