Unified threat management

Easily secure your network

Unified Threat Management

Unified Threat Management is a combination of many solutions to secure your network, consisting of the following components:

  • Firewall
  • VPN Access
  • (WiFi) Captive Portal
  • Intrusion Detection and Prevention
  • Web filtering
  • Strong authentication

VPN Access

A Virtual Private Network (VPN) is a technology that allows you to establish a secure network connection to a remote network, thereby making you part of that particular network. Consider, for example, your company network: If you have files on a server that you can only access when you are on location, you can use a VPN to set up a connection to that location so that you can still access your files remotely.

(WiFi) Captive Portal

A Captive Portal is a modified login page where, for example, you must first accept the general terms and conditions of the company that offers you WiFi before you can access the network. This can also take the form of someone having to like or follow you on social media first (or if they don't have social media sign up for a newsletter first) before they can access the public WiFi. Furthermore, with the help of the Captive Portal you can leave your customers on your network for a limited time. This can be very useful for a guest network, or if, for example, you want to issue vouchers that are only valid for a specific time.

Web filtering

Web filtering allows you to block certain dangerous sites or content at the network level. This allows you, for example, to prevent your employees from being on Facebook or YouTube, which increases productivity. You can choose from certain pre-sorted categories that you can block and you can also make adjustments yourself by, for example, allowing certain sites and blocking other sites.

Strong authentication

The ID Control strong authentication service secures external access, web applications, online portals and other systems in an efficient and cost-effective way - without the overhead costs usually associated with the implementation and maintenance of a two-factor authentication solution. It overcomes all the obstacles of implementing strong user authentication for both the ASP and the end users. ID Control Service is a managed authentication solution:

  • Implementation and maintenance tasks are managed by ID Control itself.
  • The ID Control Service platform and system uses ID Control's authentication technology.
  • ID Control Service is offered to the customer as a fully outsourced authentication model, with ID Control taking care of the entire authentication process.

Unified Threat Management is available as a hardware appliance and a virtual appliance.