What is Native Threat Management System?

Today, the use of the Internet has become normal for the general public, organizations and companies. Internet usage, in addition to the benefits for users to access information and improve the business level of organizations and companies, if security requirements and policies are not followed, it can be used as a tool for abuse by external threats such as hackers, crackers, viruses, spyware, and spam. And... be converted.

Organizations and companies were forced to provide different types of security products and equipment to increase their level of security and to cover maximum threats, which imposed a lot of costs on them. Among these costs, we can mention the consumption of resources (electricity and space), training, updating and support.

389 / 5,000 Translation results The unified threat management product (Unified Threat Management) or UTM for short, is a tool that provides strategic network management and protection in an integrated and high-efficiency manner by providing various network services and network security in a common product. By installing and configuring the mentioned product at the gateway to the network, it can deal with all kinds of cyber threats and protect the organization's information and services.

Amn Pardazan Kavir Co Relying on the power and knowledge of its experts and in order to respond to the security needs of the country's organizations and in line with national production, it has been designing, producing and implementing the Integrated Indigenous Threat Management (UTM) product since 1390 and after testing the product in a laboratory environment. and the operation of the country's Informatics Industry Research Center and the evaluation of Iran's Information Technology Organization launched it on the commercial market under the brand name APKGate. The production of this product inside the country has made it possible to add specific requirements of organizations and users.

APKGate native integrated threat management product features

  • Stateful firewall
  • Virtual private networks
  • Protection of servers
  • Port Address Translation (NAT)
  • Improving the quality of communication
  • Intrusion detection and prevention
  • Networking and routing
  • User-based auditing
  • Antivirus
  • Distribution and processing of communications
  • Security based on countries
  • Address-based filtering