Managed UTM

Fortinet logo

Managed Unified Threat Management

Liquid Intelligent Technologies Unified Threat Management (UTM) is a comprehensive security solution that allows for advanced threat management. Unified Threat Management (UTM) is an approach to information security where a single hardware or software installation provides multiple security functions. UTM provides an all-in-one coverage for common security needs including firewall, intrusion detection/prevention, anti-spam, and web filtering.

Prevent breaches and attacks

Enable a first line as well as multi-layered security control defenses against network perimeter attacks. First pillar in enabling network risk mitigation

Prevent unauthorised network access

Limit access protocols, services and applications

Detect and protect against network intrusion attacks

Identify reconnaissance attempts and defend against intrusions

An enabler for Secure Remote Access

VPN ability enables secure remote access sessions

Features of Unifed Threat Management

Liquid provides Managed Security and UTM solutions that are fully maintained and supported by IT security experts, offering you a comprehensive and superior service to reduce your capex and operational security expenditure

Multi-tenant – Liquid owned MSSP offering consisting of virtual UTM per customer

Dedicated UTM – Customer-owned device hosted within Liquid DC or at customer premises

Multi-tenant Vendor options – Cisco and Fortinet

Dedicated – Cisco, Fortinet, Check Point, Sophos, and Palo Alto to be provided upon request

Solution options – Next-generation firewall (NGFW), Virtual private networking (VPN), Secure Access Service Edge (SASE), Secure SD-WAN, and Zero Trust

Consolidated Management and Reporting – Reporting to relevant stakeholders

Event Logging and Storage – Linked to service level agreement (SLA)

Monitoring and Analysis service options – Monitoring and analysis linked to service level agreement (SLA)

The Liquid Intelligent Technologies Solution assists our clients by preventing:

Unauthorized Access​ – unauthorized access by users or devices, e.g., remote endpoints​

Unauthorized utilization of Network Protocols, Services, Applications and IPs​ –Misuse and compromise via vulnerable or weakly configured network protocols, services, IP’s and applications​

Malicious code and malware attacks, including phishing ​- Virus attacks, compromise via malicious code website exploits, phishing in all its forms ​

Hacker reconnaissance, exploits and Penetration – Hacker attacks on public facing infrastructure aimed at gaining access to private network assets​

Intrusion and Brute Force ​- Intrusions attempts in all it forms including brute force attacks on user credentials​

Denial of Service (DoS) and Distributed DDos – Interception of sensitive information including user passwords​

Data Interception – Interception of sensitive information including user passwords​

Web content filtering

Includes web access management and control, and related protection

Protection against DOS attacks

Protect against most basic DOS attacks

Gateway between security zones

Acts as gate between public and private (sensitive) networks with varying policy and protection requirements

Enables compliance

Enables compliance to legislative, regulatory, and contractual requirements


Leave your details and our team will be in touch

Contact Us