Integrated Security Threat Management System (MITA) and Related Subsystems of MITA UTM
Application:
Providing network security services.
Product Introduction:
Integrated security threat management system (MITA) supports common network security services in an up-to-date manner. Some of the features of this system are as follows:
Increasing the productivity of the organization by strengthening of security and preventing unauthorized and malicious traffic from entering the network Preventing viruses and malicious codes from entering through external networks The possibility of optimal management of Internet resources such as bandwidth, the possibility of identifying users and authenticating them upon requesting the use of resources (using the MITA authentication module) Increasing the efficiency of Internet resources such as bandwidth by preventing it from being wasted for repeated requests through the storage management module (Cache module).
The possibility of establishing private secure communication between the centers of the organization The possibility of creating the structure of «error conditions» The possibility of obtaining diverse and integrated reports from various system functions (user access – usage – traffic – firewall states)
The possibility of simple and centralized management through the web interface IDS/IPS system with the ability to update from domestic servers Has tools for managing network services under the user interface
Technical Specifications:
The product has the following modules:
* Firewall, IDS/IPS, WAF, VPN, QOS, Fail over / Load balancing, Network tools, Bandwidth management, Accounting, Routing, Active Directory, DNS, DHCP, Reporting, NTP, Management of digital certificates , User management
* Unicode languages such as Farsi have been used in the production of a firewall with an exclusive operating system.
* The entire build and compilation system is based on a FreeBSD system, where all the modules and the system itself are finally extracted in one package as an ISO file, and all the stages of producing the modules and the subsystem are carried out automatically
Company | |
---|---|
Type | This product is information security software. |
Service Type and Platform | |
Product or Service Category |