UTunnel VPN and ZTNA
UTunnel Secure Access delivers Cloud VPN, ZTNA, and Mesh Networking solutions to ensure secure remote access and smooth network connectivity.
ACCESS GATEWAY: Our Cloud VPN as a Service enables quick deployment of Cloud or On-Premise VPN servers. Utilizing OpenVPN and IPSec protocols, it facilitates secure remote connections with policy-based access control, allowing you to easily establish a VPN network for your business.
ONE-CLICK ACCESS: The Zero Trust Application Access (ZTAA) solution transforms secure access to internal business applications such as HTTP, HTTPS, SSH, and RDP. Users can access these applications through web browsers without needing client software.
MESHCONNECT: This Zero Trust Network Access (ZTNA) and mesh networking solution provides granular access controls to specific business network resources and supports the creation of secure interconnected business networks.
SITE-TO-SITE VPN: The Access Gateway solution also allows for the setup of secure IPSec Site-to-Site tunnels. These tunnels can connect UTunnel's VPN servers with other network gateways, firewalls, routers, and unified threat management (UTM) systems.
Learn more
Control D
Control D is a customizable DNS filtering and traffic redirection platform that leverages Secure DNS protocols like DNS-over-HTTPS, DNS-over-TLS and DNS-over-QUIC, with support for Legacy DNS.
With Control D you can: block malicious threats, block unwanted types of content network wide (ads & trackers, IoT telemetry, adult content, socials, and more), redirect traffic using transparent proxies and gain visibility on network events and usage patterns, with client level granularity.
Think of it as your personal Authoritative DNS resolver for the entire Internet that gives you granular control over what domains get resolved, redirected or blocked.
Learn more
Active Wall
Active Wall employs independently developed middle layer drivers as its filter engines, providing a more low-level approach compared to other software that relies on WinPCap. Unlike WinPCap, which is a protocol-type driver limited to monitoring without blocking capabilities, other software utilizing WinPCap can only block TCP communications, leaving UDP, ICMP, and IGMP packets unaddressed. Extensive online usage has demonstrated that Active Wall is more stable, accurate, and effective over time. In contrast to most similar applications that only offer a single Passby monitoring mode, Active Wall provides multiple operational modes, including Gateway, Bridge, and Single modes. Users are advised to utilize either the Gateway or Bridge modes for optimal functionality. While the Passby mode restricts Active Wall's ability to block only TCP packets due to network topology limitations, the Gateway and Bridge modes empower it to block all types of data packets effectively. This versatility makes Active Wall a comprehensive solution for network management and security.
Learn more
Sophos Intercept X for Mobile
Intercept X for Mobile safeguards users, their devices, and corporate information from both familiar and novel mobile threats by utilizing our industry-leading deep learning engine, Intercept X. This solution is effortlessly managed via Sophos Central, which integrates seamlessly with the comprehensive Sophos suite of next-generation cybersecurity measures. Sophos Intercept X for Mobile provides continuous oversight of device integrity, alerting users when a device is compromised, allowing for prompt remediation or automatic revocation of access to corporate assets. Security advisors for devices are capable of detecting jailbreaking or rooting, subsequently informing users and administrators about essential operating system updates. Positioning a robust first line of defense at the mobile network level for both Android and iOS devices, real-time analysis of network connections is conducted to identify any suspicious traits that may indicate an attack. This proactive approach significantly reduces the chances of Man-in-the-Middle (MitM) attacks. Additionally, web filtering and URL verification effectively block access to known harmful sites on mobile devices, thereby enhancing overall security. With these comprehensive features, users can feel more confident in the security of their mobile environments.
Learn more