Firewall and Intrusion prevention System, VPN server, Application control, content filtering
SAFEUTM –
NEXT GEN FIREWALL.
Hardware Independent


SAFEUTM FEATURES
Content Filtering
Internet access control with 500 million blocked addresses in 145 categories. The largest list of categories helps you to prevent access to harmful sites while allowing access to educational resources, or social media. Protect your users from offensive information and keep access to well-proven sites.
PS&IDS based on Suricata®
SafeUTM uses the fastest IPS&IDS system – Network-based intrusion detection system software that operates at the application layer and can block attacks, DoS, spyware, Windows telemetry, botnet command centers, cryptomainers, and prevents virus activity within the network. Blocking rogue regions by GeoIP and IP reputation. Suricata allows monitoring of all network ports and supports multithreading.
WAF - web application firewall
Protects internal web resources by using the Web Application Firewall when publishing them to the Internet. Filtering and protecting mail traffic for published mail servers. SafeUTM WAF is protecting the network traffic from vulnerable HTTP traffic from XSS attacks, SQL injection, etc.
Monitoring and reports
Categorized reporting on the use of web resources. Reports on allowed and blocked sites. Detailed log by resource visit time.
REMOTE with VPN
Get remote access with up-to-date protocols: Wireguard, IKEv2/IPSec, SSTP, L2TP/IPSec. Instructions, VPN-agent, VPN-connection creation script. User authentication with Active Directory.
Intrusion Prevention System
Blocking attacks, DoS, spyware, Windows telemetry, botnet command centers, cryptominers, prevention of virus activity within the network. Blocking unfavorable regions by GeoIP and IP reputation.

AN IN-DEPTH COMPARISON OF FEATURES BETWEEN
SAFEUTM AND KERIO CONTROL

Features
SafeUTM
Kerio Control
Software and hardware
x86-64
Proprietary system based on NG Routers/ VM installed on the VM host
Base Operating System
Fedora OS
Debian OS
Virtualization Supported
VMware, Microsoft HyperV, VirtualBox, KVM, Citrix XenServer
VMware or Hyper-V environment
Intrusion Prevention System (IPS)
Firewall
Deep packet Inspection (DPI)
WAF (Web Application Firewall)
via resource publishing
Block by IP Reputation / GeoIP
Brute Force attack protection
AN IN-DEPTH COMPARISON OF FEATURES BETWEEN
SAFEUTM AND UNTANGLE
Features
SafeUTM
Untangle
Software and hardware
x86-64
NG Firewall OS
Base Operating System
Fedora OS
NG Firewall
Virtualization Supported
VMware, Microsoft HyperV, VirtualBox, KVM, Citrix XenServer
VMware ESX, ESXi
Intrusion Prevention System (IPS)
Firewall
Deep packet Inspection (DPI)
WAF (Web Application Firewall)
via resource publishing
Block by IP Reputation / GeoIP
Brute Force attack protection
COMPLEX ON THE INSIDE
EASY ON THE OUTSIDE
Quick installation
& migration
The installation of SafeUTM takes only 10 minutes. Integration with Active Directory, DLP, SIEM and monitoring systems are activated in a few clicks. Migrate from Kerio Control, Microsoft TMG, MikroTik, StoneGate Firewall, etc.
Gateway // Proxy server
flexible integration
Hypervisor support from VMware, Microsoft Hyper-V, VirtualBox, KVM, Citrix XenServer, application control through (DPI)Web Application Firewall and mail relay. Integration with monitoring systems (Zabbix-agent, SNMP), DLP (via ICAP), Microsoft Active Directory. Antivirus scanning of mail and web traffic with our best partners technologies.
Integration into Network Infrastructure
SafeUTM supports the user Active Directory authentication, while the monitoring of the System itself can be connected to Zabbix monitoring server and SNMP Manager.
Online tech support
Our engineers can answer all your questions about installation, setup, migration and operation. Get tech support directly from the web administration interface – we reply in seconds.
MINIMUM HARDWARE REQUIREMENTS
OF THE UP-TO-DATE VERSION

Platform
UEFI support required
Processor*
Intel Pentium G/i3/i5/i7/Xeon E3/Xeon E5 with SSE 4.2 support
RAM*
8 Gb (16 Gb if number of users is over 75)
Storage
HD or SSD, capacity 64 Gb or more, with SATA, mSATA, SAS interface or compatible hardware RAID. Additional HD or SSD when using mail server.
Network
Two network interface cards (or two network ports) 100/1000 Mbps. Cards
with Intel, Broadcom chips recommended. Realtek, D-Link and others supported.
Hypervisors
VMware, Microsoft Hyper-V (2nd generation), VirtualBox, KVM, Citrix XenServer.
Additional
Display and keyboard
Notes
UEFI support required. Hardware RAID controllers (integrated in the chipset) not supported. Fixed but not dynamic hard drive size necessary for virtual machines.
* Requirements vary greatly depending on the network load and used services such as content filtering, antivirus and intrusion prevention system.

No preinstalled OS or additional software is necessary to install and run Safe UTM. Safe UTM is installed
to a dedicated server from an installation CD or USB-flash, file system is automatically created and all necessary components are installed.

You can see configuration examples and load test results in the documentation. You can get equipment recommendations and find out compatibility details in the technical support service.

Standard Windows, Linux or Mac OS X software is sufficient to connect to the device server. Connection of mobile devices on Android, iOS and other OSs is supported.
Get a Fee Trial
Contact us for more information
By submitting this form, I confirm that I have read and agree to the SafeDNS PrivacyPolicy and agreed to receive emails
Created by SafeDNS
© 2022. All rights reserved