Ugunssiena IT http://firewall.lv Cybersecurity solutions Mon, 30 Jan 2017 08:00:16 +0000 en-US hourly 1 https://wordpress.org/?v=4.5.3 U51 http://firewall.lv/2017/01/30/u51/ Mon, 30 Jan 2017 07:47:08 +0000 http://firewall.lv/?p=402 Do not compromise security for performance The Ugunssiena U51 solution is the most powerful desktop solution we offer and provides security without the performance degradation witnessed by users of many other firewall solutions. This allows for U51 appliance users to use full Internet performance and deploy the reliable protection even…

The post U51 appeared first on Ugunssiena IT.

]]>
Do not compromise security for performance

The Ugunssiena U51 solution is the most powerful desktop solution we offer and provides security without the performance degradation witnessed by users of many other firewall solutions. This allows for U51 appliance users to use full Internet performance and deploy the reliable protection even for fast internet connections with bandwidth exceeding 100 Mbps.

CAD-0230-v-600

Product overview:

  • Intel® Rangeley Atom™ Processor SOC
  • Intel® QuickAssist Technology QAT embedded
  • Up to 16GB DDR3L SO-DIMM
  • 2 x Intel i210 GbE ports and 4 GbE ports from SoC Quad MAC
  • One bypass segment
  • One SATA and CFEX storage interface
  • One Mini-PCIe slot and reserved PCIex1 connector
  • RJ-45 type console and two USB ports
  • Rack mount option available
  • Gen 3.0 bypass segment

Feature Detailed Description:

CPU Board

  • Intel® Rangeley Atom™ Processor C-Series 2 cores 1.7GHz

System Memory

  • DDR3L 1333MHz SO-DIMM up to 16GB

VPN speed using SHA-1 hash algorithm and AES256 encryption

  • 127 Mbps

Ethernet Port

  • 2x PCIe GbE RJ45 and 4x SGMII GbE RJ45

Expansion

  • 2x PCIe 2.0 B Portwell NIC slot, 1xstandard PCIe Slot

Bypass

  • 1x bypass segments on i210

Storage Device

  • One 2.5″ HDD
  • CFEX socket onboard

Serial Port

  • One front access RJ45 for system console
  • One 2×5 pin-header

LEDS

  • Power State, Storage Status, Ethernet Status, Ethernet Speed and Bypass

USB

  • Dual USB2.0, front access

Power

  • 40W 12V power adapter

Dimension

  • W:210mm x D:210mm x H: 43mm

The post U51 appeared first on Ugunssiena IT.

]]>
Par mums http://firewall.lv/2016/10/19/par-mums/ Wed, 19 Oct 2016 13:07:41 +0000 http://firewall.lv/?p=376 SIA “Ugunssiena IT” Mūkusalas iela 47A, Rīga LV-1004, Latvija Reģistrācijas Nr. LV40003646605 Norēķinu konta Nr. LV30HABA0551005515188 Swedbank, HABALV22 Tālrunis: 67807099 Tehniskā atbalsta dienests: 67807098, 29151830 Ugunssiena administratora rokasgrāmata PDF  

The post Par mums appeared first on Ugunssiena IT.

]]>
SIA “Ugunssiena IT”
Mūkusalas iela 47A, Rīga LV-1004, Latvija
Reģistrācijas Nr. LV40003646605
Norēķinu konta Nr. LV30HABA0551005515188
Swedbank, HABALV22


Tālrunis: 67807099
Tehniskā atbalsta dienests: 67807098, 29151830
e-pasts_en2

Ugunssiena administratora rokasgrāmata PDF

 

The post Par mums appeared first on Ugunssiena IT.

]]>
SSL proxy http://firewall.lv/2016/08/30/ssl-proxy/ Tue, 30 Aug 2016 13:33:22 +0000 http://firewall.lv/?p=359 SSL proxy is used to provide Network Traffic Security System with the ability to monitor not only open but also SSL encrypted traffic. It is necessary as today most of the traffic is SSL encrypted and thus protected from monitoring by NTSS directly. To achieve it, SSL proxy serves as…

The post SSL proxy appeared first on Ugunssiena IT.

]]>
SSL proxy is used to provide Network Traffic Security System with the ability to monitor not only open but also SSL encrypted traffic. It is necessary as today most of the traffic is SSL encrypted and thus protected from monitoring by NTSS directly. To achieve it, SSL proxy serves as a man-in-the-middle. It essentially is HTTPS proxy virtually invisible to users.

As shown in the illustration below, encrypted traffic instead of being sent directly to the user is sent through SSL proxy. Thus user’s browser sees the data encrypted by SSL proxy who also dynamically generates a certificate for the server user is communicating with and signs it with its own root certificate. So SSL proxy receives traffic encrypted by the server, but user’s browser receives traffic encrypted by SSL proxy. NTSS receives unencrypted traffic from SSL proxy.

As open traffic only ever exists inside Ugunssiena IT solution and is safely stored in NTSS, it is perfectly safe from any perspective, both possible internal attacks as well as external ones. There is simply no way for anyone to access encrypted traffic as “outside the box” it is always encrypted.

The post SSL proxy appeared first on Ugunssiena IT.

]]>
Automatic ISP failover for VPN http://firewall.lv/2016/08/22/automatic-isp-failover-for-vpn/ Mon, 22 Aug 2016 09:55:57 +0000 http://firewall.lv/?p=341 A unique feature for setups with more than one internet connection. Works also in configuration with more than one office and ensures failover of ISP as well as VPN providing continuous intranet communications. If VPN failover occurs users observe only the short delay in network communication. In fact, even VoIP…

The post Automatic ISP failover for VPN appeared first on Ugunssiena IT.

]]>
A unique feature for setups with more than one internet connection. Works also in configuration with more than one office and ensures failover of ISP as well as VPN providing continuous intranet communications. If VPN failover occurs users observe only the short delay in network communication. In fact, even VoIP communication sessions do not time out.

If there is more than one office using Ugunssiena cybersecurity suite, connections between offices are used to determine if each particular internet connection is alive.

Failover is provided for following:

  • Routing
  • NAT
  • VPN
  • DNS

Use in Single office with two ISP’s

In one office setup most useful is automatic failover of the ISP (Routing and NAT). That allows for users to not to worry about the availability of the internet as long as at least one internet connection is working properly.

For users outside the office, it is possible to use VPN for secure connection to the company’s resources.

DNS failover functionality is useful in case you host your home page at the office. In this case, outside visitors of your home page will experience only the short period when the homepage will be unavailable. As DNS records are automatically changed, availability of home page will resume.

Use at Multiple offices

If your organization has operations in more than one geographic location with Ugunssiena cybersecurity suite you can set up secure intranet by using standard internet connections at the offices. Military grade encryption for VPN and failover functionality will ensure availability and security of all your companies’ intranet resources and communications.

With multiple office setup you can still use all features described in one office scenario plus seamlessly share companies resources all over the organization no matter at which office they are located.

If two internet connections are available for example at two geographically remote offices, VPN connection is set up in a way to automatically use the best possible connection. With two internet connections in two remote sites, there is in total four possible combinations to establish VPN channel. All four possible link combinations are constantly monitored and the best is used to communicate. If link quality deteriorates, automatic VPN failover to the new best link is performed. Naturally, it means that in case if one of internet providers fails the remaining will be automatically used for VPN communication.

The post Automatic ISP failover for VPN appeared first on Ugunssiena IT.

]]>
Our Vision http://firewall.lv/2016/08/16/our-vision/ Tue, 16 Aug 2016 08:13:08 +0000 http://test.firewall.lv/?p=302 We care about our customer safety first and we are committed to delivering the world-class cybersecurity products and our professional support services! Our cybersecurity software tools and appliances are built to protect our customer business with cutting-edge digital counter-defence, monitoring and cybersecurity surveillance methods. We envision that rock-solid IT security…

The post Our Vision appeared first on Ugunssiena IT.

]]>
We care about our customer safety first and we are committed to delivering the world-class cybersecurity products and our professional support services!

Our cybersecurity software tools and appliances are built to protect our customer business with cutting-edge digital counter-defence, monitoring and cybersecurity surveillance methods.

We envision that rock-solid IT security must follow the gold standard principle of multiple layers of protection, with everything integrated into one centralised enterprise-wide management system. Good user interface experience is “king” for our customers and for us, therefore our SSL-protected web GUI is easy to use, secure to manage remotely, intuitive and without compromising critical functionality.

Obviously, the first line of defence is your network perimeter. Everyone knows that there are an uncountable number of threats in the always connected Internet age: hackers, cyber hooligans, rough employees, spying of commercial secrets, bot malware, customer financial and private data phishing etc. Therefore our perimeter defences (firewall, VPN, NAT router) are only the beginning of our products powerful cyber defence capabilities for our customers. Equipped with easy to use securely encrypted interface, simple to learn web GUI and group policies, our perimeter defences deployed in distributed locations, can be safely managed from a single sign-on web GUI, for basic common tasks even by personnel who are not networking experts. Ease of use of our UI for perimeter defences, smart routing, multiple security zones, one-click defence policy application across many devices, all without compromising the security of your corporate network, is one of the most crucial advantages of our security suite. Another advantage is cost-efficiency, where our customer gets a fully integrated firewall and VPN suite to interconnect all offices with secure communications at a fraction of the cost of similar by performance and features products from industry leaders.

Secondly, we make our customer corporate email absolutely secure and reliable. Email is the most critical application in enterprises today, but email is also the main malware entry vector today. We filter all email on our network gateways, removing the need to install and manage antivirus and antispam software on user PCs and other connected devices. For spam filtering, we use advanced Bayesian machine learning methods of Artificial Intelligence, with both ad hoc trainable spam messages detection capability and with automated gradual learning facility. In addition to antispam filtering, multiple antivirus filters and firewall-rules based corporate-wide quarantine email accounts for secure and reliable email management are provided. Combined into one product that works as an email-proxy server and is custom configurable through firewall rules for each account or domain (multiple domains supported), our solution is guaranteeing the highest quality of corporate end-user email experience.

Thirdly, we equip our customers with unbreakable encryption software and teach our customers how to protect corporate information and email from prying eyes using customer own iron-clad PKI encryption, including own Certificate Authority. We enable strong encryption choice to our customers that go far beyond most standard office productivity software with its surveillance-tailored backdoors, telemetry-based spying and often purposefully by nation-states weakened encryption.

Finally, we ultimately provide our customers with a holistic all network traffic recording, long-term storage and real-time security analytics solution, that is as easy to use and as productive for cybersecurity tasks as web search today. Our Network Traffic Security System with its user-friendly search-driven GUI and interactive analytics is so easy to use, that even non-experts can use it to quickly discover malware, spyware, and ransomware, detect unauthorized computer use or track down and eliminate insider threats. NTSS complements our perimeter defences for our customer with a blanket-wide actual network traffic recording across the corporate network, with the capability to store all that data for months or years, and with instant look-back and the actual traffic replay possibility on moment’s notice. NTSS is dramatically inhibiting the activity of cyber criminals and preventing loss of data such as user financial data or credit cards, by content-based alerting, and by holistic recording of the full evidence (all IP traffic) necessary to convict the bad insider employees or track down external criminals who are trying to do harm to our customers.

Our EU made encryption and PKI certificate signature software offers you the same or better protection of your communications confidentiality than military-grade encryption key management, without specific limits on your own key sizes you may choose. We help corporate management to install and use own unbreakable PKI encryption, that works with most PC based office productivity software suites (Outlook, Thunderbird etc.).

Our vision is that our customer suite of cybersecurity products has to deliver all-encompassing complementary layers of protection to our customers, both covering the threats at the network perimeter and inside the corporate network infrastructure.

We are committed to constantly improve existing and bring new capabilities to our cybersecurity product suite following these principles, with everything integrated into one management suite, so that the entire our cybersecurity infrastructure can be reliably managed either by our customer personnel or by us if customer entrusts to us this critical responsibility. We also can train and certify our partners to support our products.

We care about customer satisfaction and that enables us to grow the number of medium and large companies we are already providing managed cybersecurity services.

We strongly believe that the best defence for our customer is always a well-equipped and well-informed security services employees that are vigilant and are using perfectly integrated suite of cyberdefence software tools to automate massive corporate data scanning and monitoring procedures, while being ready to immediately react on cybersecurity incidents to find and sanitize malware sources, and then prosecute criminals with full evidence and the full force of the law. Yet the worldwide shortage of skills of talent in cybersecurity can also be addressed by entrusting this responsibility to professionals like our company. All our products are designed with the optional capability to be securely managed remotely over encrypted channels, with our experienced engineers assisting managers and employees of our customers for any outstanding issues of cybersecurity.

In cybersecurity and in modern digital business, the time is more valuable than money today. Our well-supported and modern cybersecurity solutions enable our customers to deter and stay ahead of cybercriminals. Our customers know that and benefit from our reliable, integrated, full-stack IT security suite that actually delivers on that crucial advantage.

We welcome business owners and corporate managers to join our vision!

Please kindly submit your enquiry about our products (click here) and our representative will contact you to learn your needs and propose the best solution.

Ugunssiena team

The post Our Vision appeared first on Ugunssiena IT.

]]>
Email Security http://firewall.lv/2016/07/14/e-proxy/ Thu, 14 Jul 2016 13:27:49 +0000 http://test.firewall.lv/?p=137 Email Security is designed to protect your organisation’s e-mail from illegal access, viruses distributed by e-mail and unwanted e-mails e.g. spam. One may think of an Email Security as a firewall for your e-mail system. It functions as a filter that blocks spam messages and viruses in e-mail messages and…

The post Email Security appeared first on Ugunssiena IT.

]]>
Email Security is designed to protect your organisation’s e-mail from illegal access, viruses distributed by e-mail and unwanted e-mails e.g. spam. One may think of an Email Security as a firewall for your e-mail system. It functions as a filter that blocks spam messages and viruses in e-mail messages and puts suspicions content to the quarantine so you can later decide what action to take on each individual affected e-mail message.

At predefined intervals of time users receive e-mail report on e-mails in quarantine e.g. blocked e-mails if any. The user then can view, delete or report as Not Spam, or receive each e-mail in quarantine.

E-mail attachment control functionality checks attachments for viruses, checks compressed attachments, blocks e-mails with attachments of forbidden type and e-mails with attachments exceeding defined size. Blocks document macros.

E-mail content control function allows blocking e-mails by the context in header and body text, wildcards allowed. Use different context rules for selected e-mail addresses or e-mail domains.

Email Security also provides Archiving functionality allowing archiving e-mail messages by e-mail address, e-mail domain name and other parameters.

Rules are used to even better control e-mail processing flow. As rules are executed in the order they appear on the list, it is possible to additionally control e-mail flow by just aligning the rules in the right order. With rules, user can set different actions to be taken on an individual e-mail address, e-mail domain name or user group. Also, user authorization can be used as a rule. When setting rule, one can use wildcards.

User groups are possible to import from AD or other LDAP server and by doing that filtering of non-existing e-mail addresses is done. To further mitigate malicious e-mail messages, domain name DNS check is done for each e-mail message. So if name address is different from one registered in DNS, e-mail is sent to quarantine.

Bocked_e-mails-real

Technical specification

E-mail filtering based on rules:

  • By IP address
  • By e-mail address
  • By e-mail domain
  • By e-mail or email domain groups defined in e-proxy

Anti-spam control:

  • Combination of mathematical Artificial Intelligence methods and heuristics to eliminate spam
  • Antispam control using Bayesian AI filtering methods on the actual email content
  • Easily trainable by users anti-spam database with simple forwarding “Spam/Not Spam” method
  • Retraining possibility when necessary
  • Customer specific heuristic rules based ’email firewall’ policy
  • Global, group-based and individual email-account policy granularity
  • Incoming e-mail control by domain
  • Outgoing e-mail control by senders e-mail address
  • Control by groups using parameters mentioned above
  • System-global anti-spam filters
  • Dedicated anti-spam filters for selected user groups or domains
  • E-mail with multiple addressees is Quarantined if contains non existing e-mail addresses

Supported protocols:

  • Simple Mail Transfer Protocol (SMTP)
  • SMTP authorisation
  • TLS support

Compatibility with third-party e-mail systems:

  • MS Exchange
  • Office 365
  • Lotus Notes
  • SENDMAIL, Postfix and other UNIX based systems
  • Novell
  • Mercury
  • NT e-mail servers etc.

Log and audit functions:

  • Log of selected system events
  • Statistical reports including virus TOP list
  • Log of configuration change
  • System administrator action log

E-mail attachment control functionality:

  • File and attachment antivirus check
  • Unpacking and inspection of compressed attachments at multiple levels
  • Supporting following archive formats: zip (zipx, jar, xpi, odt, ods, docx, xlsx, epub), 7z, arj, rar, cab, and many others
  • Blocking of e-mails or attachments by file type (EXE, CMD, VBS, JS, Office macro, etc.)
  • Blocking of e-mails or attachments by pre-defined size
  • If selected, blocking of encrypted attachments or attachments impossible to unpack (protected by password)

E-mail content control function:

  • Content control by defined context in e-mail headers
  • Content control by defined context in e-mail body
  • Content control by defined word, phrase or template (using wildcards)
  • Quarantine for filtered e-mails
  • Global system-wide content control settings
  • Content control for selected users or domains

Antivirus functionality:

  • Antivirus control with warning messages to all parties (sender, receiver, admin)
  • Antivirus control for packed or archived e-mail attachments
  • Integration with various antivirus products
  • Possibility to use more than one antivirus engine for all the traffic
  • Automatic antivirus database update
  • Quarantine for infected e-mails

Warnings about events:

  • Automatic warning to sender, recipient and admin about e-mail control event like virus found, “bad” content etc.
  • Warning message in pre-defined free text format

Quarantined e-mail report and search allowing to:

  • Receive e-mail
  • View e-mail
  • Delete e-mail
  • Report as Not Spam

Optimisation and settings:

  • Queue control of received/to be sent messages
  • Configurable number of simultaneously processed messages
  • System resource control and preventive warnings if system runs low on resources

Archiving of e-mail messages:

  • By address
  • By domain
  • By user group
  • By direction of communication

Management functions:

  • Web interface
  • Multilanguage support with ability to switch between languages at any time
  • Connection between admins console machine and e-proxy server is encrypted using SSL protocol
  • Command line support
  • Integrated management with management of other Ugunssiena products
  • New configuration is applied to the system in real time, no restart is needed

System expansion:

  • Modular design. Separate modules for e-mail security system, the antispam filter, etc. It is possible to use only a few or all of the modules available
  • Selection of cryptographic algorithms for use in system according to customers needs
  • Redundancy by deploying multiple hardware units

Antivirus compatibility

E-proxy works with all main antivirus vendor products. Typically we recommend using products of one of the following vendors:

  • Clam AV (freeware)
  • Sophos
  • Kaspersky Lab

Authentication and encryption with certificate server:

  • It is possible for users to set up own PKI infrastructure (generate key pairs, sign X.509 certificates and revoke them)
  • Users may use system generated digital certificates for e-mail encryption

 

The post Email Security appeared first on Ugunssiena IT.

]]>
VPN http://firewall.lv/2016/07/14/vpn/ Thu, 14 Jul 2016 10:58:41 +0000 http://test.firewall.lv/?p=134 Ugunssiena VPN server maintains all remote connections. Ugunssiena VPN clients, in turn, maintain remote connections to the central site or main office where VPN server is located. Main functionality of Ugunssiena VPN: Maintaining secure and encrypted communications even on the insecure public networks New session cryptography key is generated for…

The post VPN appeared first on Ugunssiena IT.

]]>
Ugunssiena VPN server maintains all remote connections. Ugunssiena VPN clients, in turn, maintain remote connections to the central site or main office where VPN server is located.

Main functionality of Ugunssiena VPN:

  • Maintaining secure and encrypted communications even on the insecure public networks
  • New session cryptography key is generated for each session and/or after pre-selected time intervals
  • TripleDES or another cryptography algorithm is used for fast traffic encryption
  • Uses IPsec and is compatible with other IPsec systems
  • Use of encryption keys of defined length. Depends on hardware performance and required level of security
  • Authentication using X.509 digital certificates
  • Flexible configuration allows selecting type of traffic and services VPN lets trough
  • Data flow compression allows for faster communication
  • It is possible to use hardware cryptographic accelerator to reduce load on CPU and improve the throughput of VPN connection
  • Users may choose to use double encryption of the VPN connection by encrypting both on software and hardware level

Protocol support on the VPN network:

  • TCP and UDP
  • BOOTP, BGP, DNS, FTP, HTTP, HTTPS, KERBEROS, LDAP, NTP, OSPF, POP3, RADIUS, RIP1/2, RSH, RLOGIN, SMTP, SNMP, TELNET, VRRP etc.
  • Windows networking protocols
  • Novell IP, Samba, UNIX NFS and other file and print service protocols
  • Oracle, MS SQL, Sybase, MySQL, Postgres and other SQL access protocols
  • VoIP and audio/video protocols including Real audio and IP telephony protocols
  • Application level protocols (LotusNotes etc.)

Accounting and audit:

  • VPN traffic log
  • System configuration changes log
  • System administrator action log

Quality control of the VPN connection:

  • Counting of VPN traffic with selected time intervals
  • Graphical monitoring of VPN load
  • Configuration of quality settings in VPN server
  • Possibility to maintain several connections of different priority in one VPN tunnel. Useful for separating real-time traffic (voice, streaming video) from the rest of communication.

Authentication and encryption:

  • User authentication using access code and password
  • User authentication using digital certificate (PKI)
  • Different size of cryptography keys from 1024 (basic level) to 8184 (military grade encryption)
  • Session TripleDES key size up to 168 bits
  • 509 standard digital certificates
  • Connection from administrator console computer to VPN system encrypted using SSL3 protocol

Management functions:

  • Centralized VPN server and VPN client management
  • Centralized VPN network configuration and monitoring of the VPN connections
  • Web interface
  • Multilanguage support with ability to switch between languages at any time
  • Command line support
  • Integrated management with e-proxy management
  • New VPN configuration is applied to the VPN tunnel in real time, no system restart is needed
  • Support of text-like IP addresses for centralized VPN configuration

Stability and reliability:

  • Real-time monitoring of VPN service and tunnel with automatic service restart if malfunction is detected
  • Real-time control of the system resources (memory, network interfaces, disc) according to pre-defined levels
  • Automatic failover between VPN service modules in redundant setups

The post VPN appeared first on Ugunssiena IT.

]]>
U81 http://firewall.lv/2016/07/11/rackmount/ Mon, 11 Jul 2016 14:15:59 +0000 http://test.firewall.lv/?p=106 Enterprise networks Protecting enterprise networks requires greater flexibility and innovation to address increasingly sophisticated threats. Ugunssiena’s enterprise network security solutions provide reliable security architecture for advanced protection against the cyberattacks. Large network also means large target Today cyber criminals are well organized and technically proficient so they can target large…

The post U81 appeared first on Ugunssiena IT.

]]>
Enterprise networks

Protecting enterprise networks requires greater flexibility and innovation to address increasingly sophisticated threats. Ugunssiena’s enterprise network security solutions provide reliable security architecture for advanced protection against the cyberattacks.

Large network also means large target

Today cyber criminals are well organized and technically proficient so they can target large enterprises and data centers. And it happens with alarming frequency because they know that there is more to take if they attack of larger network succeeds.

Increased use of cloud-based services and virtualization within large enterprises and data centers introduces new security challenges. Enterprises today must protect confidential data and technical resources while allowing greater ability to easily adapt to new business trends and needs.

CAR-4030-600-crop

Product overview:

  • Intel® 4th Generation Core™ Processors with C226 Chipset
  • High Scalability with 3 Expansion slots
  • Maximum capacity of 24 GbE ports or Maximum of 4 x 2.5″ swappable HDD/SSD
  • Modulized IPMI option supported
  • Integrated LCD display with control buttons
  • 4 DIMMs DDR3 (ECC option) up to 32GB

Feature Detailed Description:

CPU and Chipset

  • 4th Generation IntelⓇ CoreTM Processor w/ IntelⓇ C226 Chipset Platform

System memory

  • 4 slot for DDR3 /1600 DIMMs, up to 32GB

Ethernet Port

  • Dependant by Portwell NIC

Bypass

  • Dependant by Portwell NIC

Expansion

  • 2 x PCIe x8 slot
  • PCIe x4 and PCIe x2(Slot B)from PCH
  • 2 x PCIe x4(Slot A) from CPU
  • 1 x PCIe x8 Golden Finger (Slot C) from CPU

Storage Device

  • Two 2.5” Swappable SATA HDD/SSD
  • CF Socket

Serial Port

  • Front-access RJ45 system console
  • One 2×5 pin-header

LCD Panel

  • 2×16 Characters

LED

  • Power / HDD

USB

  • Dual USB 2.0

VGA

  • Optional from LOM or VGA module

LOM

  • IPMI 2.0 w/ GbE speed (Optional)

Power

  • 250W Single Flex ATX / 300W Redundant PSU / DC48V

Dimension

  • 438(W) x 483(D) x 44(H) mm

Operating Environment

  • Temperature: 0 to 40°C (32 to 104°F)
  • Humidity: 20 to 90%RH

Storage Environment

  • Temperature: -10 to 70°C (14 to 158°F)
  • Humidity: 5 to 95%RH @ 55°C

Certification

  • CE / FCC

The post U81 appeared first on Ugunssiena IT.

]]>
U31 http://firewall.lv/2016/07/11/midrange/ Mon, 11 Jul 2016 14:10:13 +0000 http://test.firewall.lv/?p=102 Small Business Small businesses need a cost-effective security solution that offers robust protection and ease of use. Ugunssiena brings its security expertise to a range of solutions optimized for your unique needs. Few small businesses have money for complex security solutions and resources to manage them. Yet, in a modern…

The post U31 appeared first on Ugunssiena IT.

]]>
Small Business

Small businesses need a cost-effective security solution that offers robust protection and ease of use. Ugunssiena brings its security expertise to a range of solutions optimized for your unique needs.

Few small businesses have money for complex security solutions and resources to manage them. Yet, in a modern world, even small business needs comprehensive and advanced protections against cyber threats. The best choice for a small business without dedicated security personnel is a simple device that covers all the bases and works out of the box providing:

  • Affordability — A cost that comfortably fits even on a limited budget
  • Ease of use — Can be easily set up and deployed, and included management for those who need it
  • Peace of mind — Provides reliable security with minimal intervention on users side
Do not compromise security for performance

A common problem small businesses face when it comes to deploying robust protections is performance. Most often, vendor bandwidth claims fall short when put to the real-world test. It results in degraded Internet speeds and leads to the reduction of security level or disabling security services altogether, to compensate for the lack of performance.

The Ugunssiena U31 solution provides security without the performance degradation witnessed by users of many other firewall solutions. This allows for small businesses to use full Internet performance and deploy the reliable protection.

Product overview:

  • Supports Intel Atom E3825 & E3845 / Celeron J1900 CPU
  • Memory: 1 x DDR3L(1.35V) 1333 SO-DIMM, up to 8GB
  • Four Intel I211-AT Gigabit Ethernet interfaces
  • Independent management console(RJ45)
  • one 2.5” SATA Hard disk

Feature Detailed Description:

CPU

  • Intel® Atom™ Processor E3825 (1M Cache, 1.33 GHz, 2C2T)
  • Intel® Atom™ Processor E3845 (2M Cache, 1.91 GHz, 4C4T)
  • Intel® Celeron® Processor J1900 (2M Cache, 2.42 GHz, 4C4T)

CPU Board

  • CAPB-0225VR
  • Board size: 170 mm x 140 mm

System Memory

  • 1 DIMM socket
  • Support DDR3L-1333
  • up to 8GB

VPN speed using SHA-1 hash algorithm and AES256 encryption

  • 105 Mbps

Ethernet

  • 4 PCI-E (x1) Gigabit Ethernet port base on Intel I211-AT

Storage Device

  • 1 x SATA interface 2.5” Hard disk

VGA Interface

  • 1 x Internal VGA pin header (2 x 5-pin)
  • A semi-cutting hole for standard D-Sub 15-pin VGA connector on chassis

PSU

  • 40W, 12V/3.3A power adapter

Front Panel

  • Ethernet interfaces: Four RJ45 Ethernet connectors.
  • RS232 interface: RS232 port with RJ45 connector for system console
  • System LED: Power and Data access.
  • Ethernet LED

Rear Panel

  • DC power inlet
  • F/D Button
  • 2 USB port
  • 1 D-sub port
  • 1 Console port
  • 4 RJ-45 connector for PCI-E (x1) GbE interfaces
  • Power On/Off Button

Dimension

  • 182 x 150 x 40 mm

The post U31 appeared first on Ugunssiena IT.

]]>
U21 http://firewall.lv/2016/07/11/soho/ Mon, 11 Jul 2016 14:06:03 +0000 http://test.firewall.lv/?p=98 Efficient Small Office and Home network protection Today’s home networks do double-duty as they are used both for personal and business needs. Home users often have multiple devices simultaneously connected to the Internet that requires protection from various types of threats. And cybercriminals know that many small office and home…

The post U21 appeared first on Ugunssiena IT.

]]>
Efficient Small Office and Home network protection

Today’s home networks do double-duty as they are used both for personal and business needs. Home users often have multiple devices simultaneously connected to the Internet that requires protection from various types of threats. And cybercriminals know that many small office and home networks have minimal security protection.

Small office and home network security requires a product that offers the same sophisticated, always-on threat protection that businesses require. Ugunssiena’s U21 appliance provides home users with the complete threat protection they need to safeguard all of their PCs and mobile devices.

Do not compromise security for performance

A common problem SOHO users face when it comes to deploying robust protections is performance. Most often, vendor bandwidth claims fall short when put to the real-world test. It results in degraded Internet speeds and leads to the reduction of security level or disabling security services altogether, to compensate for the lack of performance.

The Ugunssiena U21 solution provides security without the performance degradation witnessed by users of many other firewall solutions. This allows for U21 appliance users to use full Internet performance and deploy the reliable protection.

CAD-0231-v

Product overview:

  • Up to 8GB DDR3L SO-DIMM
  • 4 x GbE ports
  • 1 x SATA
  • Intel QuickA Technology
  • Rack mount option available Low
  • WiFi as an option

Feature Detailed Description:

CPU Board

  • Intel® Atom™ C2358 SoC processor

System Memory

  • 1 DDR3/L 1333MHz SO-DIMM up to 8GB

VPN speed using SHA-1 hash algorithm and AES256 encryption

  • 75 Mbps

Ethernet Port

  • 4 x PCIe GbE RJ45

Storage Device

  • 1xSATA connector for SATA DOM & Micro SD Socket

Serial Port

  • One front access RJ45 for system console

LEDS

  • Power State, Storage Status, Ethernet Status, Ethernet Speed

USB

  • Dual USB2.0, front access

Power

  • 40W 12V power adapter

Dimension

  • W:165mm x D:105.5mm x H: 43mm

The post U21 appeared first on Ugunssiena IT.

]]>