In the modern world, it is not only office computers that connect to the Internet and various networks, but also many devices that manage road, transportation, industrial, and other infrastructures. The security of these facilities is extremely important, but standard means of protection are not always effective during extreme operating conditions.
Operating Under Extreme Conditions
The UserGate X appliance, in contrast to other devices in our product line, is designed to work in the harshest of conditions: at temperatures from -40C (-40F) to 70C (160F) and at a relative humidity of 5% to 95%. This model has a compact size, weighing about 2 pounds, and can be mounted on a wall or DIN rail. Because of all this, it can be used to protect industrial, transportation, and other facilities that are located outdoors.
The UserGate X model is based on the same technology used by UserGate solutions that protect corporate networks. It can be used to provide firewall functionality (Next Generation Firewall, or NGFW), protect against attacks (Intrusion Detection and Prevention System, or IDPS), block dangerous scripts and applications, and defend against viruses, in addition to other security features. The model processes traffic at speeds up to 300 Mbps as a firewall and up to 10-15 Mbps when security features are turned on (intrusion prevention, threat protection, etc.).
The platform uses the proprietary operating system UG OS, which guarantees high speeds for troubleshooting and the ability to quickly fine-tune the system even for the most complex business needs.
Security for the Industrial Internet of Things
The release of UserGate X is related to the cybersecurity of industrial facilities, a pressing concern in the context of the Industrial Internet of Things (IIoT).
There has been a constant growth in the number of smart devices for industrial systems, and many of these fall under the category of non-maintainable items. The functional capabilities of these devices are also still in development. This is why a comprehensive approach is not often used for maintaining and securing these facilities in most cases. Solutions that are currently being applied do not guarantee comprehensive security and stable infrastructure operation.
Secure VPN Connection
UserGate X1 also supports a Virtual Private Network (VPN), which creates logical networks on top of another network (such as the Internet) to provide a secure connection between offices. In this case, one UserGate server operates as the server while another acts as a client that initiates the connection. This connection brings company offices in different locations together in a single logical network and applies unified security settings without any extra effort.
Tunnels can be established using Layer 2 Tunneling Protocol (L2TP), and the data being transmitted can be protected with IPSec.
The updated version of UG OS, which is used by UserGate X, supports the configuration and management of an automated SCADA (Supervisory Control And Data Acquisition) system. An administrator can use this system to control traffic by setting up rules for the detection, blocking, and logging of events. This allows the core operations of the technological process to be automated while also permitting human control and intervention if needed.
|Maximum Firewall Throughput||0,3 Gbps|
|Maximum IPS Throughput||10 Mbps|
|Maximum Advanced Threat Protection Throughput||15 Mbps|
|Maximum L7 Application Control Throughput||15 Mbps|
|Maximum Heuristic Antivirus Throughput||8 Mbps|
|Recommended number of users*||Up to 5|
|Ports||2 with expansion cards|
Mounted on a DIN rail, 57,5x130x127
17.24 x 22.83 x 1.73 inches
|Power Consumption (Maximum)||10.27 W|
|Operating temperature||from -40 ºС to +70 ºС|
* The recommended number of users is determined based on the average employee profile. This value can vary widely depending on the kind of work performed by company employees and the logging settings on the UserGate server.
|Next Generation Firewall (NGFW)|
|Intrusion Detection and Prevention System (IDPS)|
|Advanced Threat Protection (ATP)||
|Automated Threat Response (Security Orchestration, Automation and Response)|
|Application Control (L7)|
|Internet access control|
|Virtual Private Network (VPN) support|
|Bring Your Own Device (BYOD) concept support|
|High Availability and clustering|