Netgear Unified Threat Management Appliances Aimed At Small Business GatewaysNetgear Unified Threat Management Appliances Aimed At Small Business Gateways
Netgear's just announced ProSecure Unified Threat Management (UTM) appliances aim to identify threats in the cloud, block them at the gateway, and to do so at prices aggressively aimed at small business budgets, even in tight economic times.
April 17, 2009
Netgear's just announced ProSecure Unified Threat Management (UTM) appliances aim to identify threats in the cloud, block them at the gateway, and to do so at prices aggressively aimed at small business budgets, even in tight economic times.Netgear's new line of UTM appliances, priced from $375-$550, is intended as a response to both a shifted threat environment and the reality of the budget constraints smaller (under 30 users) businesses face, according to Jason Leung, senior product manager for SMB security at Netgear.
The threat environment's shift, Leung said in a conversation with bMighty recently, from a push strategy (threats coming at your business from outside) to a pull strategy (threats brought into your network from the Web, e-mail, etc., by your employees)has meant a dramatic increase in the exposure of small businesses.
"Pull affects everybody," Leung says, "not just the large businesses that hackers intially targeted."
Te Netgear solution is a device positioned at the business gateway, with cloud-based real-time Web analysis and url filtering, along with Sophos anti-malware, Mailshell anti-spam and spam analysis, as well as firewall and intrusion protection. Additionally, the appliance supports p2P and IM monitoring as a means of enforcing business usage policies.
Leung feels that the real-time cloud-based scanning is a vital component of effective protection. "The cloud affords us the ability to understand threats in real-time, as they appear," he says, "as opposed to more limited anti-virus signature sets or anti-spam techniques."
He feels that the company's Stream Scanning technology enables real-time scanning, identification, and filtering of far more attack signatures than traditional anti-malware and anti-spam approaches, and does so with minimal latency or performance demands on the business network.
The ProSecure UTM appliances for small businesses will be available in July; price includes one-year subscription to security services based on number of users.
Leung notes as well that since subscription renewals for the second and subsequent years are as much as 55% lower than the initial buy-in, which covers the appliance as well as the subs.
Netgear's aggressive pricing (for the level of services promised in addition to the gateway harwdare) makes these worth a look by under 30-user busineses, I believe. The company's offering a Free 30 Day UTM Trial here.
If you take a look, let me know what you think.
And don't forget about bMighty's April 29th SMB Security On A Budget Onlie Event.
Sign up here:
bMighty bSecure is a virtual event designed to help your company stay secure in the most cost-effective way possible. bMighty and InformationWeek editors will bring together SMB security consultants, analysts, and other experts, along with real IT execs and users from small and midsize companies to share the secrets of keeping your company secure without breaking the bank.
About the Author(s)
Tricks to Boost Your Threat Hunting GameNov 06, 2023
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Everything You Need to Know About DNS Attacks
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
How Enterprises Are Managing Application Security Risks in a Heightened Threat Environment
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
AI in Cybersecurity: Using artificial intelligence to mitigate emerging security risks
Get the Gartner Report: SOC Model Guide
Building Immunity: The 2021 Healthcare and Pharmaceutical Industry Cyber Threat Landscape Report