NEW
Unlimited Network Security

Get the multilayered security SMBs need to prevent, detect, and remediate threats from entering your network

Network security capabilities
in a value-priced package

image

Secure your Network

image

Secure your Traffic

image

Secure Endpoints

Secure your Network

Secure your Network:
Firewall and Intrusion detection

Configure your firewall with easy-to-use traffic rules, controlling in- and outbound communications by URL, application, traffic type and more

Intrusion detection and prevention constantly monitors inbound and outbound network communications for suspicious activity. Log or block the communications depending on the severity

Prevent viruses, worms, Trojans and spyware from entering your network. Going beyond checking files for malicious code; it scans your network traffic for potential attacks.

Down arrow See more firewall features

Secure your Traffic

Secure your Traffic:
Network Anti-virus & malware protection

Why trust email security to one antivirus engine when you can have the combined power of four. GFI MailEssentials can engage the power of leading brands including BitDefender, Avira, Kaspersky, and Cyren

Each engine features its own heuristics and detection methods. You gain maximum protection for your email environment to block email-borne viruses and other malware more effectively

Block spoofed emails, stop emails from blacklisted DNSs or those that link to known problem URLs or phishing sites, remove non-RFC compliant emails, detect emails from forged senders and more techniques to slash the spam waste.

Down arrow See more antivirus features

Secure Endpoints

Secure Endpoints:
Patch & vulnerability management

Automatically discover and group all the elements of your network: computers, laptops, mobile phones, tablets, printers, servers, virtual machines, routers and switches.

Scan your network for missing patches and vulnerabilities. Over 5,000 patches are released every year; any one may be the flaw hackers target.

Automatically deploy patches centrally, or by deploying agents on machines and save server processing. Identify top vulnerabilities and take action with clear priority.

Get the automated, formatted reports auditors need to demonstrate compliance for the multiple requirements in PCI DSS, HIPAA, SOX, GLBA, PSN, and CoCo regulations.

Down arrow See more vulnerability management features

Additional features

image

Firewall and Intrusion detection

  • Create secure, high-performance server-to-server connections between your offices running with an easy-to-setup VPN technology
  • Prioritize and monitor network traffic to guarantee high-speed transmission for your most important traffic types. Cap lower priority traffic by setting a bandwidth maximum or guarantee high priority traffic by assigning minimum thresholds
  • Distribute Internet traffic across multiple links with Internet Link load balancing, automatically disabling and re-enabling links to ensure continuous Internet access
  • Protect your network from bandwidth-hogging web and application traffic such as streaming video or by blocking peer-to-peer networks
  • Manage or block access to 100+ continuously updated categories of content and applications with the optional Web Filter w/ application awareness
  • Access security settings, manage users and bandwidth, and set policies from a customizable web-based interface on your desktop or mobile device
  • Manage multiple Kerio Control firewall deployments through a centralized web interface
image

Vulnerability management and patching

  • Group your devices for better management. Distribute management to different teams and still see everything from one central management dashboard.
  • Find the gaps in Microsoft, MacOS, Linux operating systems. Identify missing patches in web browsers and 3rd party software such as Adobe, Java, and 60 more major vendors.
  • Identify non-patch vulnerabilities with an updating list of 60,000+ known issues as well as items like open ports and system information about users, shared directories and services.
  • Control which patches you install and roll-back patches if you find problems.
  • Install more than just security patches: many patches fix bugs to help applications run better.
image

Anti-virus & malware

  • Spam is estimated to be 45% of your email volume and a potential source of attacks. Get the power of 14 advanced email filtering technologies you can see in action. Filter spam out before it hits email boxes.
  • You can also extend control to users. Provide reports and ongoing access to quarantined emails to enable them to release what they want to receive. They can also customize their own black and whitelists.