30

Nov

Yamaha to release UTM appliances "UTX100" and "UTX200" for small and medium scale in March

On the 25th, Yamaha Corporation collaborated with Check Point Software Technologies (hereafter, Check Point) to launch a new lineup of network security products, UTM (unified threat management) for small and medium-sized businesses. Appliances "UTX100" and "UTX200" were announced. Sales are scheduled to start in March, and the price is open.

UTX100UTX200

UTX100/UTX200 (hereafter Yamaha UTM) is a UTM appliance that integrates and provides the functions required by small and medium-sized companies. In addition to the firewall function, application control, URL filtering that also supports identification of SSL (HTTPS) communication, intrusion prevention (IPS), antivirus that supports various malware detection methods, communication between terminals infected with bots and C&C servers A single unit can provide functions such as bot countermeasures that detect communication and determine the type of bot from the content of communication, and spam (junk mail) countermeasures.

With the firewall function, it is possible to create rules based on the user's IP address, application, communication protocol, etc., and manage communication. Network access restrictions and bandwidth usage can be set in detail for each user/group. It is also possible to restrict access by linking with an Active Directory (AD) server.

 Application Control classifies over 8,400 applications (as of January 2021) into over 150 categories, and can block applications that pose security threats. It also supports addition of blocked targets and individual permission.

The difference between UTX100 and UTX200 is the processing performance and interface. UTX100's maximum throughput (bidirectional) is 970 Mbps for VPN, 2 Gbps for firewall, and 600 Mbps for NGFW. The maximum throughput (bidirectional) of UTX200 is 1950 Mbps for VPN, 6.4 Gbps for firewall, and 970 Mbps for NGFW.

Yamaha, UTM Appliances

As for the interface, the UTX100 is equipped with a 5-port switch for LAN and WAN port x 1, and the UTX200 is equipped with an 8-port switch for LAN, WAN port x 1, and DMZ port x 1. All are compatible with 1000BASE-T/100BASE-TX/10BASE-T, and only the DMZ port of UTX200 is a combo with SFP. As for the operation mode, it is installed under the Yamaha router and can centrally manage both the network and security from the LAN map of the router "bridge mode", and the router / security function is realized in one unit, and the Yamaha router and client software can be used together. Equipped with a "router mode" that allows interconnection of VPNs. It can be used properly according to the usage scene.

Of these, when used in "bridge mode", the Yamaha router can automatically detect and manage the Yamaha UTM installed under it. It also has a function to check network security incidents detected by both products on the Yamaha router dashboard. In addition, Check Point's mobile app "WatchTower" (iOS/Android) can be used to remotely manage Yamaha UTMs. On the other hand, in "router mode", in addition to Yamaha products, Check Point remote access clients (Windows / macOS / iOS / Android / Linux) can also be used.

In addition, Yamaha will provide a support window dedicated to Yamaha UTM "UTX Support Service" to support product introduction and operation. Specifically, in addition to being able to check device logs and change settings by remote control from the support center, automatically created security diagnostic reports can be sent periodically by e-mail, and firmware can be automatically updated at the timing instructed by the user. services such as performing updates,

In addition, when a failure occurs in the equipment, a failure diagnosis will be carried out and a new equipment will be shipped as an "advance send-back".

 Yamaha UTM comes with a security license for the first year, and if you want to continue using the security function after the second year, you will need to purchase and update the license separately. In addition, "UTX support service" is positioned as an accessory service of the security license.