Managed Network Security

Included Features:

  • Stateful, Next-Generation firewall
  • VLAN to VLAN routing
  • Link bonding / failover
  • High availability, cellular failover
  • Traffic shaping / prioritization
  • WAN optimization
  • Site-to-site VPN
  • Client VPN
  • Automatic, Self-Healing MPLS to VPN Failover
  • Splash pages
  • Configuration templates
  • HTTP content caching
  • Group policies
  • Client connectivity alerts
  • Geography based firewall rules
  • Intrusion detection / prevention
  • Content filtering
  • Anti-virus, Anti-malware and anti-phishing
  • Web search filtering

 

Stay connected, even if your main internet line goes down!
You’re covered by our cellular failover service – If your standard internet line goes down for whatever reason we can automatically (or on demand) switch you over to a 3G/4G cellular connection for some or all of your services. All hardware is included at no extra cost or fee!
**Standard cellular data usage rates will apply.

 

Comprehensive Security in a Single Box
Every Security Appliance VTG delivers is a step to complete security for all users. Meraki Security Appliance supports several features, like a stateful firewall and integrated Sourcefire intrusion prevention (IPS) engine, to secure your networks. Threat definitions and filter lists are seamlessly updated, ensuring every MX has bleeding-edge protection from the latest vulnerabilities and troublesome websites.
Every network is a potential target for malicious attacks; Cisco Meraki MX Security Appliances provide best-in-class, easily configurable intrusion prevention to protect yours. Cisco Meraki’s sophisticated content filtering enables the users of your network to enjoy the benefits of the Internet while remaining protected from inappropriate or harmful content, maintaining productivity and compliance with applicable business and regulatory requirements.

 

Included is VTG’s well-respected support team.

 

Intuitive, Centralized Management
The support dashboard provides deep visibility and control over all of your Security Appliances from any Internet-accessible device, anytime, anywhere. View networked client users, bandwidth consumption, and application usage across all sites—and push policies to block, shape, or whitelist activity to optimize performance and user experience.

 

[VIEW PDF]

Category

Cloud, Managed Services, Networking, Security