Intrusion Prevention System

Our Intrusion Prevention System (IPS) responds quickly to hacker attacks that exploit known vulnerabilities and also detects malicious activity within a corporate network.

Security issues are identified heuristically by analyzing the signatures of already known threats. IPS can detect and block hacker attacks in real time. Preventive measures may include blocking specific segments of network traffic, immediate disconnection, or notifying the network administrator.

For small businesses, branch offices, POS-systems, schools, Wi-Fi hotspots

Networks of any size should be protected from external attacks, viruses, and a wide range of modern cyberthreats. UserGate С is a compact and easy-to-use network device that can protect the networks of small organizations or branch offices with anywhere from a few dozen users to a hundred or more.

For large enterprise networks and telecom providers

Corporate network security must be maintained through a high-performance platform that has a good safety factor and the potential for scaling up. UserGate E is a full-fledged network server solution capable of resolving security issues related to all types of online threats in networks with a thousand users or more.

For large enterprise networks and data centers

For large corporate networks and data centers, it is critical to use reliable network solutions that provide high availability, fail-safe redundancy, scalability, and flexibility when it comes to integrating them with your network infrastructure. UserGate F combines all the security features you need with the capabilities necessary for functioning with maximum stability under an extremely high load.

For outdoor industrial and transport objects

In the modern world, it is not only office computers that connect to the Internet and various networks, but also many devices that manage road, transportation, industrial, and other infrastructures. The security of these facilities is extremely important, but standard means of protection are not always effective during extreme operating conditions.

Virtual Firewall

For organizations that prefer a virtual platform

UserGate can be deployed on the customer's virtual infrastructure. All hypervisors are supported, including VMware, Hyper-V, Xen, KVM, OpensStack, and VirtualBox. The functionality of our virtual solution is completely equivalent to that of the UserGate hardware system.

How to set up a virtual image?

For large enterprise networks and telecom providers

The UserGate Log Analyzer E collects and performs the initial processing of data from UserGate firewalls. The product is deployed separately from UserGate Security Gateway and is a full-fledged network server solution capable of protecting against all kinds of Internet threats on networks with up to a thousand or more users.

For large enterprise networks and data centers

UserGate Log Analyzer F25 is intended for use at major companies and data centers. This hardware and software system has great information storage capabilities and allows data received from UserGate servers to be processed as quickly as possible.

Virtual Firewall

For organizations that prefer a virtual platform

Virtual UserGate Log Analyzer can be deployed on the customer's virtual infrastructure. All hypervisors are supported, including VMware, Hyper-V, Xen, KVM, OpensStack, and VirtualBox. The functionality of our virtual solution is completely equivalent to that of the UserGate hardware system.

Rewards