We use cookies on this website to provide a user experience that’s more tailored to you. By continuing to use the website, you are giving your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.

 I accept

Products & Services

Offering Highest Level of Managed Services and Excellent Products

CITIC TELECOM CPC > Products & Services > Unified Threat Management (UTM)

Unified Threat Management Your Managed Network Security Solution With Intelligent Aggregated Alerts

Unified Threat Management │ Trust CSI™ UTM

Unified Threat Management (UTM) is an information security methodology wherein multiple security solutions are provided by a single hardware or software installation.

Even though threats to IT security remain an exemplary concern, yet you are confronted with narrowing budgets, clashing priorities and more complicated situations. You have invested in multiple solutions to help protect your data and systems, but how do you handle them efficiently? CITIC Telecom CPC in the domain of Threat Management delivers 24-hour surveillance and assistance for multivendor products as well as tools for change management and policy perspective.

TrustCSI™ Unified Threat Management (UTM) offers all-in-one functionality comprising of IPS, anti-virus, firewall and monitoring of online movements to protect the network system against common possibilities of hacking, threat, vulnerability and potential risk elements. Unified threat management interprets information security management by offering a single security administrator and reporting point in place of manifold vendor products.

Security coverage

●Unified Threat Management should contain at least some focalized security features, such as:

●Intrusion detection

●Intrusion prevention

●Network firewall

●Layer 7 (application layer) firewall and control

●Gateway anti-virus

●Email filtering

●Deep packet inspection

●Content filtering and web proxy

●Virtual private network (VPN)

●Data loss prevention (DLP)

●Network Tarpit

●Security information and event management (SIEM)

The above domain of coverage is in contrast to the conventional approach of offering point solutions for each specific security feature.

Advantages

Unified threat management solutions help identify and respond to security incidents before they are escalated. They also manage audit and statutory qualifications and make system configuration adjustments without device restrictions. These features also reduce costs with a streamlined pricing framework and service level that fits your controlled user population. While the modes of operation get underway, you reap the following benefits during the process:

●Cost-effective: It makes it more manageable for your company to deal with security costs.

●Flexible pricing module: Unified threat management caters to more anticipated operating costs and economy pricing.

●Advanced analytics: It also includes a real-time exchange of data while monitoring and strengthening protection.

●Security aptitude and analysis: TrustCSI™ accesses multiple technologies backed up with our Security Operations Center.

●Data security: It also allows anti-spam, Web filtering, and antivirus cap strategic design.

●Committed to thwart threats: Control of firewalls and intrusion prevention mechanisms to combat threats is the fundamental functioning of Unified Threat Management.

But while a Unified Threat Management adoption provides ease of management from a single device, a trivial point of concern may also erupt, which is a single point of failure within the IT infrastructure and that has got to be averted. Apparently, a UTM's implementation could run counter to one of the defense’s basic information assurance/protection strategies, as a UTM will replace multiple security items, and opting for a middle course on the UTM layer might disrupt the entire defense-in-depth approach.

Conclusion

Since 2009, Unified Threat Management (UTM) devices have become increasingly popular, partially because the all-in-one solution simplifies installation, configuration, and support. Such a system saves time, resources, and manpower compared to multiple security systems management. Instead of having a multiplicity of single-function appliances, all of which require individual awareness, consideration and support, network administrators can now manage their security defenses centrally from a base computer.

In its deployment flexibility, CITIC Telecom CPC’s Trust CSI™ Unified Threat Management is unmatched in its field of applications. We render you options to choose from hardware, software, clustering, wireless, and virtual or cloud with simple high-availability, branch office connectivity and centralized management and reporting alternatives. And unlike our rivals, when you decide to contact us, we don't obligate you to compromise on functionality or performance. Our intrinsic features on every model and form factor are available before you venture for the potential implementation.

As the openness of the Internet, complexities of modern businesses and the heightened interconnectivity between internal and external environment that create widespread risks for hacks, threats and vulnerabilities by sources both outside and inside a company.

Many enterprises are applying firewalls and private network as their first line defense against malicious traffic, which could merely maintain minimal protection against known threats whilst leaving the network unprotected for emerging unintended threats from insiders.

To ensure a full protection to organizations’ information security, CITIC Telecom CPC’s TrustCSI™ UTM provides enterprises a hassle-free first line network defense solution that requires for no CAPEX investment and comprehensive technical support.


Holistic approach for corporate network Highlights Related Products

Holistic approach for corporate network

  1. MPLS Level Cross-site Infection Protection with user authentication feature
  2. Internet Level Gateway Protection
  3. Critical Assets Protection
  4. Virtualized Security Gateway on SmartCLOUD™
  5. Flexible private network deployment to secure remote access
  6. Advanced Threat Detection against APT
Highlights
  • Fully managed solution by security experts with 24 x 7 real-time monitoring, on-site support and hotline services, aggregated email alert and SIEM log correlation platform
  • All-in-one features including firewall, anti-virus, IPS and Internet activities control
  • End-user real-time web portal and provision of weekly report
  • Optional TrustCSI™ UTM NFV offers 99.99% service availability with single virtual appliance supported by SmartCLOUD™ Infrastructure
  • Optional TrustCSI™ Managed YourDevice Service offers remote monitoring and management services by our certified professionals to customer-provided network security devices
  • Flexible monthly payment and upgrade, scalable to business security needs
  • Device configuration management, backup and advance hardware swapping services
  • Optional features including IPSec private network and SSL private network
  • Optional TrustCSI™ UTM NFV, software based virtual appliance, designs for SmartCLOUD™ customers to shorten service provisioning lead-time comparing with traditional hardware based UTM
Related Products
Products & Services
Private Network Information Security Cloud Solutions Cloud Data Center Internet Services Managed Portal Europe & CIS Solutions
Solutions
Architecture, Engineering & Construction Automobile Banking & Finance e-Commerce Logistics and Transportation Manufacturing Professional Services Retail Trading Others
Customer Service
Customer Login Services Hotline Service Center
Resources Center
Product Leaflets New Offering Videos White Paper Success Stories
About Us
Our Company Our Partners News Center Accreditation & Awards Success Stories Videos Contact Us Careers Blog COVID-19
Contact Us

General Enquiry 886 2 6600 2588

Sales Hotline 886 2 6600 2588

Contact Us

Sitemap | Disclaimer | Net Abuse Policy | Privacy Policy | Cookie Policy

中信集團品牌認證 | 中信雲賦能
Copyright © 中信國際電訊(信息技術)有限公司 CITIC Telecom International CPC Limited

Follow Us

Welcome to CITIC Telecom CPC

You are about to visit our website

Please choose a location:

South Africa

South America

US & Canada

China Entercom

Asia Pacific
Europe & CIS
South Africa
South America
US & Canada
Need help? Chat with CPC Chatbot
Supported browsers: Latest versions of IE11, Firefox, Chrome and Safari.
Terms & Conditions
Welcome to CITIC Telecom International CPC Limited. Your conversation with CPC Chatbot may be recorded for training, quality control and dispute handling purposes. By clicking “Continue” and using CPC Chatbot, you accept and agree to be bound by our Privacy Policy and give your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.
Continue