Unified Threat Management (UTM) Firewall

Your network firewall is your company’s first line of defense against malicious cyber threats. Is it doing the most for your company, or have you found yourself addressing its shortcomings by piecemealing together an additional set of tools to meet needs such as Web content filtering, SD-WAN, secure VPN and Wi-Fi, etc.?

Unified Threat Management (UTM) technology was developed to alleviate the pain and risk of deploying and maintaining multiple security tools. The all-in-one nature of UTM technology delivers a single security appliance that can detect and subsequently prevent a vast array of threats from entering your business network.

Our UTM Firewall gives you the very best in threat detection and prevention while meeting the variety of network security and productivity challenges today’s organizations face:


  • Next Generation Firewall applies layers of network protection in a single network appliance;
  • Secure VPN provides access to remote sites via always-on encrypted tunnels;
  • Intrusion Detection/Prevention with a PCI-compliant IDS/IPS sensor that detects and blocks potentially malicious activity;
  • Advanced Malware Protection detects and blocks malware, Trojan horses and phishing websites; and
  • Geographical IP Filtering blocks malicious traffic sources from selected countries.


  • Dynamic Failover detects primary access outage and dynamically reverts to 3G/4G cellular or secondary Internet;
  • High Availability feature limits downtime with redundant UTMs and dynamic failover;
  • SD-WAN provides policy-based-routing of traffic over redundant network links; and
  • WAN Optimization minimizes traffic latency and reduces the amount of traffic between sites.

Application Control

  • Bandwidth Shaping limits the amount of bandwidth a device can consume;
  • Traffic Shaping allows for bandwidth throttling based on application types;
  • Quality of Service (QoS) ensures that traffic going through the firewall gets prioritized according to the level of quality that is required;
  • Content Filtering blocks Internet traffic based on URL categories definitions;
  • URL Blocking allows and denies traffic based on specific URLs; and
  • Network Segmentation, with biannual audits, confirms appropriate configuration.
Pylon Technology