Our clients often ask, “What is a managed firewall?” and “how is this different than a firewall I can purchase at a retail store?”.

Standard firewalls controls incoming and outgoing network traffic based on certain set of rules mostly depended upon IP address and Ports.

Whereas UTM is more comprehensive network security solution as standard firewall/Next generation firewalls are only a part of UTM security suite. UTM can be configured to act as Email Security (Email Scanners), URL filtering (web proxy), Wireless Security, Web application firewall (NGFW with application intelligence) and virtual private networks (VPNs). So much information feed of network flow into a single device further enables its events co-relation engine to provide with more conclusive and accurate security logs.


Here is some terminology to know:

  • What is QoS? Quality of service (QoS) refers to a network’s ability to achieve maximum bandwidth and deal with other network performance elements like latency, error rate and uptime. Quality of service also involves controlling and managing network resources by setting priorities for specific types of data (video, audio, files) on the network. QoS is exclusively applied to network traffic generated for video on demand, IPTV, VoIP, streaming media, videoconferencing and online gaming. Video

  • What is UTM? A unified threat management (UTM) system is a type of network hardware appliance, virtual appliance or cloud service that protects businesses from security threats in a simplified way by combining and integrating multiple security services and features. Video

  • What is VPN? A virtual private network (VPN) is a network that is constructed using public wires — usually the Internet — to connect remote users or regional offices to a company’s private, internal network. Video

  • What is intrusion prevention and detection? An Intrusion Prevention System (IPS) is a network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits. Vulnerability exploits usually come in the form of malicious inputs to a target application or service that attackers use to interrupt and gain control of an application or machine. Following a successful exploit, the attacker can disable the target application (resulting in a denial-of-service state), or can potentially access to all the rights and permissions available to the compromised application. Video

  • What are content controls / content filtering? On the Internet, content filtering (also known as information filtering) is the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable. Content filtering is used by corporations as part of Internet firewall computers and also by home computer owners, especially by parents to screen the content their children have access to from a computer. Video



Unique adaptive bandwidth throttling substantially reduces “bandwidth
hogging” and automatically prioritizes critical applications like VoIP, Citrix, and
other cloud applications. Incorporates intelligent link aggregation and fail-over.


The ZeroOutages “cloud firewall” solution provides customers with a completely managed solution which is easy to deploy and provides detailed network reporting via a simple to use web-based portal.


Globally distributed, real-time, intelligent threat protection database. ZeroOutages incorporates unsurpassed web content and application filtering technology. No other solution delivers (MED) machine learning security.

Click here to find out more about our SD-WAN services.

Printable Brochure available here