Liquid C2


Unified Threat Management

Unified Threat Management (UTM) is an approach to information security where a single hardware or software installation provides multiple security functions.

Key UTM related threats

  • Unauthorized Access – Unauthorized access by users or devices, e.g. remote end points
  • Unauthorized use of network protocols, services, applications and IPS
  • Malicious code and malware attacks, including phishing
  • Hacker reconnaissance, exploits and penetration
  • Intrusion and Brute Force
  • Denial of service (DOS) and Data interception

The Liquid Intelligent Technologies Solution

  • Multi-tenant or dedicated options – Liquid owned MSSP
  • Multi-tenant options – Cisco and Fortinet
  • Dedicated options – Cisco, Fortinet, Palo Alto, Check Point
  • Solution module options – Next Generation Firewall (NGFW), Next Generation IPS (NGIPS), Virtual Private Network (VPN), Secure Access Service Edge (SASE), Secure SD-WAN, Zero-Trust
  • Consolidated Management and Reporting – Ease of management and relevant reporting to stakeholders
  • Event Logging and Storage – Linked to requirements and service level agreements
  • Monitoring and Analysis Service option – Monitoring and analysis linked to SLA


  • Options between self-owned or Liquid owned UTM instances
  • Perimeter security controls provided through a single UTM device
  • Very cost-effective monthly LIT support option for those doing management themselves
  • Managed Security Service options to meet each customer requirements – Bronze, Silver, Gold
  • More than one UTM vendor option
  • Consolidated management, monitoring and reporting
  • Options in terms of event logging and storage
Liquid C2

Contact us to sign-up or for more information

Contact Us