Untangle NG Firewall Description

It can be difficult and expensive to manage your network and ensure that every device is protected. NG Firewall simplifies network security by providing a single, modular software platform that can be customized to meet your evolving needs. Designed for companies with limited IT budgets and IT resources, NG Firewall offers a browser-based, responsive, and intuitive interface that allows you to quickly see the traffic on your network. NG Firewall provides a comprehensive enterprise-grade network security platform that can be used to protect any organization, from content filtering to advanced threat prevention, VPN connectivity, and bandwidth optimization. Dedicated hardware appliances offer extensive network control, visibility into traffic and other events, flexible connectivity options and multiple layers of advanced protection.

Integrations

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Untangle
Website:
www.untangle.com

Media

Untangle NG Firewall Screenshot 1
You Might Also Like
It's not magic, it's real-time data with Twilio Segment Icon
Activate your data warehouse to all the tools you use with a CDP that’s fast, powerful and flexible. We'll show you how with Twilio Segment.

Product Details

Platforms
SaaS
Type of Training
Documentation
Webinars
Videos
Customer Support
Phone Support
Online

Untangle NG Firewall Features and Options

Firewall Software

Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification

Web Content Filtering Software

Antivirus
Automated Blacklist
Browser-based Management Portal
Category / Keyword Filters
LDAP Integration
Multi-Language Filtering
Reporting / Analytics
Roles / Permissions
SSL Inspection
Time-based Controls
VPN Blocking
White Label
Whitelisting

IT Security Software

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security Software

Access Control
Analytics / Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning