Vulnerabilities / Threats
05:38 PM
Dark Reading
Dark Reading
Products and Releases

NETGEAR Rolls Out New ProSecure Appliance

New UTM50 Appliance Stops More Threats than the Competition while adding Active Directory Integration and Increased Throughput to Serve Growing Businesses

SAN JOSE, Calif., Aug. 30 /PRNewswire/ -- NETGEAR , Inc.(Nasdaq:NTGR), the global networking company that delivers innovative products to businesses, consumers and Internet service providers, today announced the introduction of the NETGEAR ProSecure UTM50 Unified Threat Management Appliance (UTM50). The UTM50 is the latest addition to NETGEAR's award winning ProSecure UTM line, which protects businesses from the exponentially growing number of virus and malware threats, dangerous websites, spam emails, and hackers that threaten business environments today. Optimized for larger businesses and built with scalability in mind, the UTM50 enables businesses to protect themselves through a wide array of tools including firewall, SSL and IPSec VPN, URL filtering, network antivirus, and antispam. Widely lauded and recognized worldwide in 2010 by leading security publications as a producer of industry-leading UTMs, NETGEAR continues to outpace the competition and challenge the existing order of small and mid-market business security solutions.

The ProSecure UTM50 is an extension of the award-winning ProSecure UTM10 and UTM25 Unified Threat Management series. In addition to the benefits of these appliances, the ProSecure UTM50 integrates with Microsoft Active Directory enabled environments for single-sign-on security policies - an almost universal requirement for larger businesses around the world.

"The integration of the UTM50's security policies with Microsoft Active Directory made the solution a great fit for our business," said Frank Burnham, O'Donnell, Ficenec, Wills & Ferdig, LLP, a professional services firm that specializes in Accounting, Tax, and Audit. "Given the dynamic threat environment facing organizations today, we found the ProSecure UTM50 to be the most effective device in offering us a full featured, centralized, and flexible security component essential for network operations. We were able to achieve increasing employee productivity on the Internet through the URL filtering features and reduce our threat exposure substantially."

"Businesses need a UTM that performs without having to make concessions on security checking or consuming administration time. We find that many vendors' solutions are too big, over-featured and complex for their customers' own good," said Eric Ogren, principal analyst at the Ogren Group. "With the addition of the UTM50 to their ProSecure line, NETGEAR addresses what businesses up to 100 users need to safely use public networks with security tasks performed at optimum efficiency."

In recent testing during August 2010, The Tolly Group in partnership with AVTest GmBH evaluated the ability of the UTM50 to stop malware threats entering over web traffic via the HTTP protocol. The test found NETGEAR ProSecure to be particularly effective at stopping zoo malware, threats that appliance manufacturers often choose not to concentrate on for reasons of cost and complexity. NETGEAR ProSecure UTM50 dominated the test at 92.29 percent efficacy, followed by SonicWall with 50.19 percent and Fortinet with 39.43 percent. Other test case scenarios are ongoing and a complete report on the findings will be available in September 2010.

"Our test results determined that NETGEAR's ProSecure UTM50 surpassed the other UTM models in this test in stopping threats. Because the malware universe is huge, most appliance vendors concentrate on a limited subset of threats. UTM vendors typically do very well against such wildlist threats - NETGEAR included," said Kevin Tolly, founder of the Tolly Group. "However, zoo malware, which often mutates into new forms that threaten networks worldwide, is a clear and present danger, a danger that vendors often ignore at their customers' peril. NETGEAR shows exceptional strength at stopping both wildlist and zoo malware threats."

"NETGEAR has drawn on its unparalleled expertise in business and consumer internet user patterns to develop the industry-leading ProSecure UTM product line for business," said Jason Leung, senior product line manager, security solutions at NETGEAR. "The line in most work environments is definitely blurred between personal and business use of the web - and since 80 percent of all threats come from web surfing, businesses need smart products to protect from potential threats while keeping their core IT functions operating at the highest efficiency."

The NETGEAR ProSecure UTM50 is available now in the US for $899.00 MSRP and includes one year of web and email subscription services, 24/7 technical support and an advanced exchange warranty. It is available from leading value-added resellers, direct marketers and e-commerce sites with a novel risk-free 30-Day trial program that allows customers to try the appliance in their specific environment first before purchase.

For more information, please visit:

About NETGEAR, Inc.

NETGEAR (NASDAQGM: NTGR) designs innovative, branded technology solutions that address the specific networking, storage, and security needs of Small- to Medium-sized Businesses (SMBs) and home users. The company offers an end-to-end networking product portfolio to enable users to share Internet access, peripherals, files, multimedia content, and applications among multiple computers and other Internet-enabled devices. Products are built on a variety of proven technologies such as wireless, Ethernet and powerline, with a focus on reliability and ease-of-use. NETGEAR products are sold in over 27,000 retail locations around the globe, and via more than 36,000 value-added resellers. The company's headquarters are in San Jose, Calif., with additional offices in 25 countries. NETGEAR is an ENERGY STAR partner. More information is available at or by calling (408) 907-8000. Connect with NETGEAR at and

2010 NETGEAR, Inc. NETGEAR, the NETGEAR logo, and ProSecure are trademarks or registered trademarks of NETGEAR, Inc. in the United States and/or other countries. Other brand and product names are trademarks or registered trademarks of their respective holders. Information is subject to change without notice. All rights reserved.

Safe Harbor Statement under the Private Securities Litigation Reform Act of 1995 for NETGEAR, Inc.:

This press release contains forward-looking statements within the meaning of the U.S. Private Securities Litigation Reform Act of 1995. Specifically, statements concerning NETGEAR's business and the expected performance characteristics, specifications, reliability, market acceptance, market growth, specific uses, user feedback and market position of NETGEAR's products and technology are forward-looking statements within the meaning of the Safe Harbor. These statements are based on management's current expectations and are subject to certain risks and uncertainties, including, without limitation, the following: the actual price, performance and ease of use of NETGEAR's products may not meet the price, performance and ease of use requirements of customers; product performance may be adversely affected by real world operating conditions; failure of products may under certain circumstances cause permanent loss of end user data; new viruses or Internet threats may develop that challenge the effectiveness of security features in NETGEAR's products; the ability of NETGEAR to market and sell its products and technology; the impact and pricing of competing products; and the introduction of alternative technological solutions. Further information on potential risk factors that could affect NETGEAR and its business are detailed in the Company's periodic filings with the Securities and Exchange Commission, including, but not limited to, those risks and uncertainties listed in the section entitled "Part II - Item 1A. Risk Factors," pages 36 through 52, in the Company's quarterly report on Form 10-Q for the fiscal second quarter ended June 27, 2010, filed with the Securities and Exchange Commission on August 5, 2010. NETGEAR undertakes no obligation to release publicly any revisions to any forward-looking statements contained herein to reflect events or circumstances after the date hereof or to reflect the occurrence of unanticipated events.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Microsoft Word Vuln Went Unnoticed for 17 Years: Report
Kelly Sheridan, Associate Editor, Dark Reading,  11/14/2017
Companies Blindly Believe They've Locked Down Users' Mobile Use
Dawn Kawamoto, Associate Editor, Dark Reading,  11/14/2017
121 Pieces of Malware Flagged on NSA Employee's Home Computer
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/16/2017
Register for Dark Reading Newsletters
White Papers
Current Issue
Managing Cyber-Risk
An online breach could have a huge impact on your organization. Here are some strategies for measuring and managing that risk.
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.