Managed Unified Threat Management (UTM)

Protect your whole network from external threats and allow users to browse the Internet safely.
C&W Managed UTM protects users ́ Internet browsing by integrating services such as the protection of external access to the network and to the Internet, IPS, content filtering, VPNs, antiviruses, and antispam. The information is authenticated by comparison with the Active Directory. When defining or consolidating security policies, the company complies with the best security practices. C&W Managed UTM provides our client access to information security management through a team of security experts that have obtained the most recognized credentials and certification of the industry. These experts will be available to support you in the diagnosis and resolution of security incidents as well as provide recommendations regarding the protection of your information assets. C&W Managed UTM can be implemented both in the client’s premises and C&W’s Data centers, using either virtual or physical appliances, delivering the same standards and quality of service in any scenario.
Services
  • Firewall: Application of security standards and policies that allow for filtering the incoming and outgoing traffic
  • Intrusion Detection and Prevention System (IPS): Implementation of security policies at an application level
  • Content filtering: Definition of filtering categories to manage users ́ permissions to access websites
  • VPNs: Configuration of Site-to-Site and SSL VPNs
  • Antispam: Filtering and analysis of incoming emails
  • Traffic Shaping: Allows the use of different bandwidth capacities for different users and applications
  • Antivirus: Detection of threats to ensure safe browsing for the company ́s users
  • Integration with the Active Directory.
Benefits
  • Support 24/7, 365 days a year
  • Access to state-of-the-art infrastructure with no upfront investment
  • Monthly reports on the service
  • Fully managed turnkey solution
  • Management of the use of the Internet through the implementation of content-filtering policies
  • Perimeter protection
  • Service Level Agreement (SLA)
  • Real-time access to the monitoring of the network security
  • Physical or virtual solution that can be implemented in the client’s Data Center

Let's Connect!