SlideShare uma empresa Scribd logo
1 de 30
ShareTech
Wireless UTM
WF Series
ShareTech WF UTM

Age of Changes

Traditional Wireless UTM

vs
ShareTech

ShareTech
Wireless UTM

ShareTech
Wireless UTM
Advantages

Here comes your footer

Page 2
Age of Changes

Here comes your footer

Page 3
Age of Changes
In 2007, Apple Inc. introduced the first smart phone.

Here comes your footer

Page 4
Age of Changes
In 2010, Apple Inc. introduced the first
iPad.

Here comes your footer

Page 5
Age of Changes
Networking connection has been changing from wired to wireless
According to TWNIC research, Taiwanese network users (mobile wireless included) ages
above 12 has been increasing from 7,360,000 to 11,070,000. It grows 17.59 %
compared to last year.
Demands for wireless broadband






Sleek, easy-to-deploy, affordable wireless access
Low-cost but efficient management
Highly flexible and optimally designed wireless networks
Improve employee job performance

Most companies still have doubts on wireless ??!!!

 Unsecure wireless network is risky to business
 Security threats hidden behind wireless control and monitoring
 Data theft

Here comes your footer

Page 6
ShareTech
Wirless UTM

Here comes your footer

Page 7
ShareTech Wirless UTM – What is WF UTM?

 SME
 Branch Office

Wireless Router

Firewall Router

Network Security

Most complete Wireless Nework
Secutiry Solutions

Here comes your footer

Page 8
Traditional
Wireless UTM
vs ShareTech
Here comes your footer

Page 9
Traditional Wireless UTM vs ShareTech
Traditional

ShareTech

Unable to detect
Online Behavior

Wireless Online
Management

Shared Key
Authentication

User
Authentication

Guests can access
the internal
network

Partition guests
and internal
wireless network

No user record

Wireless Online
User Record

Here comes your footer

Page 10
ShareTech
WF UTM
Advantages
Here comes your footer

Page 11
ShareTech WF UTM Advantages
High Security Performance
 High-performance network
security integrated into WLAN
 Supports the IEEE 802.1b/g/n
standards
 6 set SSID (Virtual Connect)
 Authentication for Wireless
Network

Here comes your footer

Page 12
ShareTech WF UTM Advantages
Multi-Layer Wireless AccessControl

Here comes your footer

Page 13
ShareTech WF UTM Advantages
6 set SSID Zone

6 set SSID isolation
Flexible VLAN management

Here comes your footer

Page 14
ShareTech WF UTM Advantages
User Access Authentication
 Guest user traffic is segmented from
employee user traffic.
 Authentication Techniques
 Control Wireless Guests
(IE browser only, accessing to the
internal network is forbidden)
 Complete Wireless Online User Record

Here comes your footer

Page 15
ShareTech WF UTM Advantages
Spam Filtering
ShareTech provides multi-layer spam filtering techniques.
ST-IP Ranking

Fingerprinting

Personal B/W
List

Bayesian
Filtering

Grey List

Auto
Learning

Here comes your footer

System B/W
List

Spam
Characteristics
Filtering

Page 16
ShareTech WF UTM Advantages
Anti-Virus – Clam AV

 In-built Clam AV virus engine
Real-time 24-hours virus database
update
Automatic updates via Internet
Scans suspicious files such as
incoming http (web) documents, FTP
downloads, email and attachments.

Here comes your footer

Page 17
ShareTech WF UTM Advantages
Wireless Network Control - Access Authentication
 Authentication technique to
increase network security
monitor all user status
fully user identity aware
optimal bandwidth allocation
 Integrated Radius Server
Authentication
(Host/POP3/AD)

Here comes your footer

Page 18
ShareTech WF UTM Advantages
Wireless Network Control - Web Filtering

 Web (Content) Filtering
Block access to inappropriate material
(eg. gambling, porn, violence, etc.)
Block sites contain attacks
(eg. hackers, virus, spyware, etc.)
Self-custom filter policies

Block URLs &
Web Content
Filtered
Information

Here comes your footer

Filtering
Information

Page 19
ShareTech WF UTM Advantages
Wireless Network Control - QoS
 QoS (Quality of service) allocates
network dynamically for all users
 Maximum/minimum bandwidth
guarantee, traffic prioritizing, and
self-custom bandwidth management
 ShareTech Smart QoS automatically
detects remaining bandwidth and
provides the highest QoS to existing
users
 Limit bandwidth usage for each SSID

Here comes your footer

Page 20
ShareTech WF UTM Advantages
Wireless Network Control - APP Control

 In-built various APP access
control techniques
Easy-to-manage network
security
Monitor employee wireless
network usage

Here comes your footer

Page 21
ShareTech WF UTM Advantages
Instrusion Detection and Prevention - IDP

 IDP inspects the packets from OSI
layer 4 -7 (application layer)
Nearly 2000 signatures
Present risk-informed categorization
Quick notification to administrator

Here comes your footer

Page 22
ShareTech WF UTM Advantages
VPN & SSL VPN
 Static VPN
IP Sec VPN
PPTP VPN
 Portable VPN
SSL VPN
 Optimize VPN speed
 Maintain stable connection
 VPN remote access service
Here comes your footer

Page 23
ShareTech WF UTM Advantages
AP Management
 Unified Access platform, brings
together wired and wireless
connections
View status of each AP
Centralized management

Here comes your footer

Page 24
ShareTech WF UTM Advantages
AP Management –Each AP Status in Hand

Here comes your footer

Page 25
ShareTech WF UTM Advantages
AP Management – Online User Control
 ShareTech WF Series Wireless
network interface
User IP
MAC Address
Online status
Administrator can take instant
actions

Here comes your footer

Page 26
ShareTech WF UTM Advantages
AP Management – Wireless Traffic Control
 Administrators can monitor
each SSID operation
Uploading flow
Downloading flow
History status

Here comes your footer

Page 27
ShareTech WF UTM Advantages
AP Management – AP Groups Control

 AP Management Interface
(edit each AP data)
AP Alias
Enable Wireless
Wireless Mode
SSID
Group
Hide SSID
Frequency
Security Mode
Key
Here comes your footer

Page 28
ShareTech WF UTM Specification
WF-200

WF-300

WF-500

Under 50

50-100

50-100

3T3R / 3dbi*3

3T3R / 3dbi*3

3T3R / 3dbi*3

1G / 1G CF

1G / 2G CF

2G / 2G CF

O

O

O

O/X

O/O

O/O

Anti-Virus

X

O

O

Anti-Spam

X

O

O

IDP

X

X

O

Anomaly IP Analysis & Co-Defense

X

X

O

AP Wireless Management

O

O

O

Client

Client / Server

Client / Server

APP Access Control

O

O

O

Content Filter

O

O

O

Network Authentication

O

O

O

Bulletin Board

O

O

O

Reports

X

O

O

VPN

O

O

O

SSL VPN

X

O

O

Applicable Users
Wireless Network / Antenna
Memory / Flash ram
Firewall
Outbound / Inbound

CMS

Here comes your footer

Page 29
www.sharetech.com.tw

Technical Support
 help@sharetech.com.tw

Sales Inquiry
 sales@sharetech.com.tw

Here comes your footer

Page 30

Mais conteúdo relacionado

Mais procurados

CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Maliha Ali
 
Presentation fortinet securing the cloud
Presentation   fortinet securing the cloudPresentation   fortinet securing the cloud
Presentation fortinet securing the cloud
xKinAnx
 

Mais procurados (13)

What You Cant See Can Hurt You
What You Cant See Can Hurt You What You Cant See Can Hurt You
What You Cant See Can Hurt You
 
العرض
العرضالعرض
العرض
 
Axiros tr069-smartmicrogrid-devicemanagement
Axiros tr069-smartmicrogrid-devicemanagementAxiros tr069-smartmicrogrid-devicemanagement
Axiros tr069-smartmicrogrid-devicemanagement
 
Fortinet Icon Library
Fortinet Icon LibraryFortinet Icon Library
Fortinet Icon Library
 
Windows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the EnterpriseWindows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the Enterprise
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
Forklift Impact Management in Real Time
Forklift Impact Management in Real TimeForklift Impact Management in Real Time
Forklift Impact Management in Real Time
 
Forklift Fleet Management, SkidWeigh Technology
Forklift Fleet Management, SkidWeigh TechnologyForklift Fleet Management, SkidWeigh Technology
Forklift Fleet Management, SkidWeigh Technology
 
Windows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesWindows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best Practices
 
Forklift Impact Management, Defender system
Forklift Impact Management, Defender systemForklift Impact Management, Defender system
Forklift Impact Management, Defender system
 
Protect your guest wifi - NOW
Protect your guest wifi - NOWProtect your guest wifi - NOW
Protect your guest wifi - NOW
 
Presentation fortinet securing the cloud
Presentation   fortinet securing the cloudPresentation   fortinet securing the cloud
Presentation fortinet securing the cloud
 
Ngfw overview
Ngfw overviewNgfw overview
Ngfw overview
 

Semelhante a ShareTech WiFi UTM

160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture
Lan & Wan Solutions
 
ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTM
sharetech
 
Manging Student Devices on the School Wireless Network
Manging Student Devices on the School Wireless NetworkManging Student Devices on the School Wireless Network
Manging Student Devices on the School Wireless Network
SecurEdgeNetworks
 
Aruba Remote Networks
Aruba Remote NetworksAruba Remote Networks
Aruba Remote Networks
hypknight
 
802.11n: Platform vs. Point Solution
802.11n: Platform vs. Point Solution802.11n: Platform vs. Point Solution
802.11n: Platform vs. Point Solution
Savvius, Inc
 
NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution Taarak
Mohit8780
 
Sangfor's Presentation.pdf
Sangfor's Presentation.pdfSangfor's Presentation.pdf
Sangfor's Presentation.pdf
ssusera76ea9
 

Semelhante a ShareTech WiFi UTM (20)

Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
 
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wi
 
160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture
 
ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTM
 
Manging Student Devices on the School Wireless Network
Manging Student Devices on the School Wireless NetworkManging Student Devices on the School Wireless Network
Manging Student Devices on the School Wireless Network
 
AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011
 
Aruba Remote Networks
Aruba Remote NetworksAruba Remote Networks
Aruba Remote Networks
 
Managing Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless NetworkManaging Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless Network
 
802.11n: Platform vs. Point Solution
802.11n: Platform vs. Point Solution802.11n: Platform vs. Point Solution
802.11n: Platform vs. Point Solution
 
Securing SCADA
Securing SCADA Securing SCADA
Securing SCADA
 
Securing SCADA
Securing SCADASecuring SCADA
Securing SCADA
 
IRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate EnvironmentIRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate Environment
 
NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution Taarak
 
Palo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security CompanyPalo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security Company
 
Sprite guard on line brochure
Sprite guard on line brochureSprite guard on line brochure
Sprite guard on line brochure
 
IRJET- Network Monitoring & Network Security
IRJET-  	  Network Monitoring & Network SecurityIRJET-  	  Network Monitoring & Network Security
IRJET- Network Monitoring & Network Security
 
Sangfor's Presentation.pdf
Sangfor's Presentation.pdfSangfor's Presentation.pdf
Sangfor's Presentation.pdf
 
FortiGate-60C
FortiGate-60CFortiGate-60C
FortiGate-60C
 
Fortinet k
Fortinet kFortinet k
Fortinet k
 
Meru Presentation
Meru PresentationMeru Presentation
Meru Presentation
 

Mais de sharetech

Ubuntu SSL VPN
Ubuntu SSL VPNUbuntu SSL VPN
Ubuntu SSL VPN
sharetech
 
如何設定不給上網(Http+https),但讓line和skype可以使用?
如何設定不給上網(Http+https),但讓line和skype可以使用?如何設定不給上網(Http+https),但讓line和skype可以使用?
如何設定不給上網(Http+https),但讓line和skype可以使用?
sharetech
 
眾至郵件伺服器-郵件系統防護
眾至郵件伺服器-郵件系統防護眾至郵件伺服器-郵件系統防護
眾至郵件伺服器-郵件系統防護
sharetech
 
如何使用Console連接眾至UTM設備
如何使用Console連接眾至UTM設備如何使用Console連接眾至UTM設備
如何使用Console連接眾至UTM設備
sharetech
 
Company profile
Company profileCompany profile
Company profile
sharetech
 
UTM + AP management
UTM + AP managementUTM + AP management
UTM + AP management
sharetech
 
Mail server backup & device mgt. →email backup
Mail server backup & device mgt. →email backupMail server backup & device mgt. →email backup
Mail server backup & device mgt. →email backup
sharetech
 
Mail server backup & device mgt. →system backup
Mail server backup & device mgt. →system backupMail server backup & device mgt. →system backup
Mail server backup & device mgt. →system backup
sharetech
 
what is Multiple subnet?
what is Multiple subnet?what is Multiple subnet?
what is Multiple subnet?
sharetech
 
How to boot mail server from a usb device
How to boot mail server from a usb deviceHow to boot mail server from a usb device
How to boot mail server from a usb device
sharetech
 
眾至資訊分散式郵件系統
眾至資訊分散式郵件系統眾至資訊分散式郵件系統
眾至資訊分散式郵件系統
sharetech
 

Mais de sharetech (20)

2015眾至10月郵件伺服器教育訓練
2015眾至10月郵件伺服器教育訓練2015眾至10月郵件伺服器教育訓練
2015眾至10月郵件伺服器教育訓練
 
Ubuntu SSL VPN
Ubuntu SSL VPNUbuntu SSL VPN
Ubuntu SSL VPN
 
ShareTech mail app使用說明
ShareTech mail app使用說明ShareTech mail app使用說明
ShareTech mail app使用說明
 
ShareTech mail app使用說明
ShareTech mail app使用說明ShareTech mail app使用說明
ShareTech mail app使用說明
 
如何建立IPSEC VPN
如何建立IPSEC VPN如何建立IPSEC VPN
如何建立IPSEC VPN
 
如何設定不給上網(Http+https),但讓line和skype可以使用?
如何設定不給上網(Http+https),但讓line和skype可以使用?如何設定不給上網(Http+https),但讓line和skype可以使用?
如何設定不給上網(Http+https),但讓line和skype可以使用?
 
眾至郵件伺服器-郵件系統防護
眾至郵件伺服器-郵件系統防護眾至郵件伺服器-郵件系統防護
眾至郵件伺服器-郵件系統防護
 
如何使用Console連接眾至UTM設備
如何使用Console連接眾至UTM設備如何使用Console連接眾至UTM設備
如何使用Console連接眾至UTM設備
 
3QMail 佈署郵件VM私有雲
3QMail 佈署郵件VM私有雲3QMail 佈署郵件VM私有雲
3QMail 佈署郵件VM私有雲
 
Company profile
Company profileCompany profile
Company profile
 
無線UTM = WiFi+UTM
無線UTM = WiFi+UTM無線UTM = WiFi+UTM
無線UTM = WiFi+UTM
 
UTM + AP management
UTM + AP managementUTM + AP management
UTM + AP management
 
Mail server backup & device mgt. →email backup
Mail server backup & device mgt. →email backupMail server backup & device mgt. →email backup
Mail server backup & device mgt. →email backup
 
Mail server backup & device mgt. →system backup
Mail server backup & device mgt. →system backupMail server backup & device mgt. →system backup
Mail server backup & device mgt. →system backup
 
what is Multiple subnet?
what is Multiple subnet?what is Multiple subnet?
what is Multiple subnet?
 
How to boot mail server from a usb device
How to boot mail server from a usb deviceHow to boot mail server from a usb device
How to boot mail server from a usb device
 
眾至資訊 行動郵件簡報
眾至資訊 行動郵件簡報眾至資訊 行動郵件簡報
眾至資訊 行動郵件簡報
 
眾至資訊分散式郵件系統
眾至資訊分散式郵件系統眾至資訊分散式郵件系統
眾至資訊分散式郵件系統
 
ShareTech Mail Server HA
ShareTech Mail Server HAShareTech Mail Server HA
ShareTech Mail Server HA
 
IPsec vpn
IPsec vpnIPsec vpn
IPsec vpn
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

ShareTech WiFi UTM

  • 2. ShareTech WF UTM Age of Changes Traditional Wireless UTM vs ShareTech ShareTech Wireless UTM ShareTech Wireless UTM Advantages Here comes your footer Page 2
  • 3. Age of Changes Here comes your footer Page 3
  • 4. Age of Changes In 2007, Apple Inc. introduced the first smart phone. Here comes your footer Page 4
  • 5. Age of Changes In 2010, Apple Inc. introduced the first iPad. Here comes your footer Page 5
  • 6. Age of Changes Networking connection has been changing from wired to wireless According to TWNIC research, Taiwanese network users (mobile wireless included) ages above 12 has been increasing from 7,360,000 to 11,070,000. It grows 17.59 % compared to last year. Demands for wireless broadband     Sleek, easy-to-deploy, affordable wireless access Low-cost but efficient management Highly flexible and optimally designed wireless networks Improve employee job performance Most companies still have doubts on wireless ??!!!  Unsecure wireless network is risky to business  Security threats hidden behind wireless control and monitoring  Data theft Here comes your footer Page 6
  • 7. ShareTech Wirless UTM Here comes your footer Page 7
  • 8. ShareTech Wirless UTM – What is WF UTM?  SME  Branch Office Wireless Router Firewall Router Network Security Most complete Wireless Nework Secutiry Solutions Here comes your footer Page 8
  • 10. Traditional Wireless UTM vs ShareTech Traditional ShareTech Unable to detect Online Behavior Wireless Online Management Shared Key Authentication User Authentication Guests can access the internal network Partition guests and internal wireless network No user record Wireless Online User Record Here comes your footer Page 10
  • 12. ShareTech WF UTM Advantages High Security Performance  High-performance network security integrated into WLAN  Supports the IEEE 802.1b/g/n standards  6 set SSID (Virtual Connect)  Authentication for Wireless Network Here comes your footer Page 12
  • 13. ShareTech WF UTM Advantages Multi-Layer Wireless AccessControl Here comes your footer Page 13
  • 14. ShareTech WF UTM Advantages 6 set SSID Zone 6 set SSID isolation Flexible VLAN management Here comes your footer Page 14
  • 15. ShareTech WF UTM Advantages User Access Authentication  Guest user traffic is segmented from employee user traffic.  Authentication Techniques  Control Wireless Guests (IE browser only, accessing to the internal network is forbidden)  Complete Wireless Online User Record Here comes your footer Page 15
  • 16. ShareTech WF UTM Advantages Spam Filtering ShareTech provides multi-layer spam filtering techniques. ST-IP Ranking Fingerprinting Personal B/W List Bayesian Filtering Grey List Auto Learning Here comes your footer System B/W List Spam Characteristics Filtering Page 16
  • 17. ShareTech WF UTM Advantages Anti-Virus – Clam AV  In-built Clam AV virus engine Real-time 24-hours virus database update Automatic updates via Internet Scans suspicious files such as incoming http (web) documents, FTP downloads, email and attachments. Here comes your footer Page 17
  • 18. ShareTech WF UTM Advantages Wireless Network Control - Access Authentication  Authentication technique to increase network security monitor all user status fully user identity aware optimal bandwidth allocation  Integrated Radius Server Authentication (Host/POP3/AD) Here comes your footer Page 18
  • 19. ShareTech WF UTM Advantages Wireless Network Control - Web Filtering  Web (Content) Filtering Block access to inappropriate material (eg. gambling, porn, violence, etc.) Block sites contain attacks (eg. hackers, virus, spyware, etc.) Self-custom filter policies Block URLs & Web Content Filtered Information Here comes your footer Filtering Information Page 19
  • 20. ShareTech WF UTM Advantages Wireless Network Control - QoS  QoS (Quality of service) allocates network dynamically for all users  Maximum/minimum bandwidth guarantee, traffic prioritizing, and self-custom bandwidth management  ShareTech Smart QoS automatically detects remaining bandwidth and provides the highest QoS to existing users  Limit bandwidth usage for each SSID Here comes your footer Page 20
  • 21. ShareTech WF UTM Advantages Wireless Network Control - APP Control  In-built various APP access control techniques Easy-to-manage network security Monitor employee wireless network usage Here comes your footer Page 21
  • 22. ShareTech WF UTM Advantages Instrusion Detection and Prevention - IDP  IDP inspects the packets from OSI layer 4 -7 (application layer) Nearly 2000 signatures Present risk-informed categorization Quick notification to administrator Here comes your footer Page 22
  • 23. ShareTech WF UTM Advantages VPN & SSL VPN  Static VPN IP Sec VPN PPTP VPN  Portable VPN SSL VPN  Optimize VPN speed  Maintain stable connection  VPN remote access service Here comes your footer Page 23
  • 24. ShareTech WF UTM Advantages AP Management  Unified Access platform, brings together wired and wireless connections View status of each AP Centralized management Here comes your footer Page 24
  • 25. ShareTech WF UTM Advantages AP Management –Each AP Status in Hand Here comes your footer Page 25
  • 26. ShareTech WF UTM Advantages AP Management – Online User Control  ShareTech WF Series Wireless network interface User IP MAC Address Online status Administrator can take instant actions Here comes your footer Page 26
  • 27. ShareTech WF UTM Advantages AP Management – Wireless Traffic Control  Administrators can monitor each SSID operation Uploading flow Downloading flow History status Here comes your footer Page 27
  • 28. ShareTech WF UTM Advantages AP Management – AP Groups Control  AP Management Interface (edit each AP data) AP Alias Enable Wireless Wireless Mode SSID Group Hide SSID Frequency Security Mode Key Here comes your footer Page 28
  • 29. ShareTech WF UTM Specification WF-200 WF-300 WF-500 Under 50 50-100 50-100 3T3R / 3dbi*3 3T3R / 3dbi*3 3T3R / 3dbi*3 1G / 1G CF 1G / 2G CF 2G / 2G CF O O O O/X O/O O/O Anti-Virus X O O Anti-Spam X O O IDP X X O Anomaly IP Analysis & Co-Defense X X O AP Wireless Management O O O Client Client / Server Client / Server APP Access Control O O O Content Filter O O O Network Authentication O O O Bulletin Board O O O Reports X O O VPN O O O SSL VPN X O O Applicable Users Wireless Network / Antenna Memory / Flash ram Firewall Outbound / Inbound CMS Here comes your footer Page 29
  • 30. www.sharetech.com.tw Technical Support  help@sharetech.com.tw Sales Inquiry  sales@sharetech.com.tw Here comes your footer Page 30