Firewall &
Unified Threat Management

Technologies Overview

Watchguard Expert Partner


Sonicwall Gold Solution Provider


Barracuda Networks Diamond Reseller


Cisco Premier Partner

  Unified threat management takes advantage of today's full-featured firewalls to allow customers to cost-effectively block the most nefarious and costly threats to their network right at the gateway, before it ever enters their network.  This includes spam, malware, viruses, and giving business owners complete control over how employees access the Internet, websites and social media.

What Is a Unified Threat Management Solution?

Unified threat management (UTM) is an emerging trend in the network security market. UTM appliances have evolved from traditional firewall/VPN products into a solution with many additional capabilities, including:

  • Spam blocking
  • Gateway antivirus
  • Spyware prevention
  • Intrusion prevention
  • URL filtering

These are functions that previously had to be handled by multiple systems. UTM solutions also provide integrated management, monitoring, and logging capabilities to streamline deployment and maintenance.

Application Control

Today, new Internet and social media applications are a common source of vulnerabilities and attacks (ie: Facebook, Twitter, YouTube, Skype, WebEx, instant messaging, etc.).  IT pros are faced with the challenge of managing or controlling a vast array of web applications without hindering productivity.  Most application traffic is now web-based over port 80 or port 443.  Adding to this challenge, some applications also use evasive techniques like encryption or they jump around non-standard ports.  And to complicate matters, the distinction between "web site" and "web application" is tenuous at best.  No longer does a traditional firewall with only port and protocol numbers suffice; the firewall administrator needs to set granular controls by application.  The business needs to understand and control which applications employees use.

Application Control makes it simple to create and enforce acceptable use policies at your company.  With Application Control, you can selectively allow, block, or restrict access to applications based on a user's department, job function, and time of day.  Once you establish your policy, Application Control allows you to see in real-time what's being accessed on your network and by whom.  You can use this information to demonstrate compliance, evaluate employee need, and refine acceptable use policies.

Do I Really Need This?

Netgear, Linksys, D-Link or other consumer-grade, residential routers work great for home computer systems but do not offer enough security or functionality to fully protect a business network.  You need a business-class commercial firewall, such as WatchGuard, SonicWALL, or Cisco to keep bad guys out, and your data secure.  If your business needs a more secure firewall, VNS can set-up, install, and configure an integrated perimeter defense.  We’ll ensure your network’s availability and the security of your company’s resources by protecting the network infrastructure against attacks.

Firewall and Security Appliance Experience & Expertise

VNS has worked with and supported nearly every major brand of firewall and security appliance, including: WatchGuard Firebox, WatchGuard XTM, WatchGuard SOHO, SonicWALL TZ, Barracuda, Cisco ASA, Cisco Pix, Linksys, D-Link, Netgear, NetScreen, Checkpoint, and Secure Computing.

VNS has been providing firewall and UTM security solutions to our Fresno, Clovis, Madera, Visalia and Oakhurst customers since 1996.

For more information or to discuss implementing a firewall/UTM security solution with VNS, give us a call at (559) 650-2600, or send us an email at

Call VNS phone number  (559) 650-2600        Email VNS        Like VNS on Facebook        Follow VNS on Twitter        Follow VNS on LinkedIn        Visit VNS YouTube Channel        Visit VNS Google Places page        Visit VNS Google+ page        Rate VNS on Yelp

Mail with questions or comments about this web site. | Site contents covered by comprehensive privacy statement.
Copyright 1996 - 2011 Valley Network Solutions, Inc. | All rights reserved. | Last modified: December 27, 2016 09:26