Netgear ProSecure UTM9S review
Netgear's new UTM9S has plenty of network security features for SMBs and some interesting expansion options too. In this review, Dave Mitchell finds out if it's the most versatile ProSecure appliance yet.
Netgear's ProSecure UTM appliances have always been affordable gateway security solutions for cash-strapped SMBs. Its latest UTM9S is its first to have a pair of modular expansion slots and integration with the company's ReadyNAS storage appliances.
The UTM9S has the same software features as all the other UTM appliances which include an SPI firewall, IPS and support for IPsec and SSL VPN tunnels. Netgear's security partners need no introduction as you have Mailshell handling anti-spam, Sophos dealing with viruses and malware and Commtouch stepping up for URL category filtering.
The appliance has four Gigabit Ethernet ports for LAN duties and two more for WAN connections which can be placed in load balanced or failover teams. Traffic metering can also be enabled on any of the WAN ports including any expansion cards. This enforces monthly upstream and downstream limits in MB and either blocks all web traffic or allows only email when these thresholds have been breached.
The UTM9S functions as a transparent gateway so installation is a cinch. For testing we dropped it between the lab network and our Internet link and the web browser's wizard had us up and running in minutes. The appliance is preconfigured with two firewall rules to look after inbound and outbound traffic. You can add custom firewall rules if you wish and apply bandwidth restriction and quality of service (QoS) profiles to selected services.
ReadyNAS integration requires an add-in to be installed on the storage appliance after which it can be used as a quarantine area and remote log store. Previously, if you powered off a UTM appliance all its logs and Flash-based graphs and statistics tables were lost.
In This Article
The essential guide to cloud-based backup and disaster recovery
Support business continuity by building a holistic emergency planDownload now
Trends in modern data protection
A comprehensive view of the data protection landscapeDownload now
How do vulnerabilities get into software?
90% of security incidents result from exploits against defects in softwareDownload now
Delivering the future of work - now
The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.Download now