Unified Threat Management (UTM) Firewall Service Data Sheet

Fully managed, cloud-based networking and security designed to protect your business.

The Business Owner’s Security Challenge

Improve your security posture and protect your business.

The IT threat landscape is more complex than ever before. Hackers have become increasingly sophisticated in their attacks and employ a variety of techniques, including malware, viruses and phishing schemes, to target their victims. Ensuring that your business is secure and protected against outside threats is not just important—it’s essential to surviving in today’s business world.

A subpar firewall continues to be one of the easiest ways for attackers to enter your network and wreak havoc. It’s critical that network firewalls are properly managed, maintained and monitored, and that requires an IT resource with specialized skills and the bandwidth to keep rules and configurations up-to-date while monitoring traffic and alerts.

47% of all breaches are caused by malicious or criminal attacks.

In 2015, 430 million new, unique pieces of malware were discovered.

The average cost of a data breach is $170 for each record compromised.

*Sources: Ponemon 2015 Cost of Data Breach Study & Symantec 2016 Internet Security Threat Report

Introducing Your Business’s New Security Team

ControlScan takes the headache out of maintaining your crucial first line of defense against malicious threats with our next generation Unified Threat Management (UTM) Firewall service. We’ll ensure that critical environments containing sensitive information and payment card data are well protected. Your UTM firewall will be configured correctly, continually monitored and in compliance with standards such as the PCI DSS and HIPAA.

You’ll also enjoy critical security features such as:

  • Anti-virus/phishing, to detect and block malware, trojans and phishing websites;
  • IDS/IPS, to alert to and prevent suspicious network traffic;
  • VPN, to ensure secure, encrypted traffic between locations;
  • Content filtering, to filter URLs using a locally downloaded or full hosted database ("top sites")

Take security off your to-do list. Let us manage it for you.

Simply by subscribing to the managed firewall service, you add a solution and a skilled support team that:

  • Ensures firewalls are implemented for maximum security as well as straight-forward compliance with standards like PCI and HIPAA;
  • Updates and upgrades firewall firmware to protect against the latest threats;
  • Remotely monitors all firewalls for alerts and unexpected events;
  • Maintains firewall rules to keep pace with changes in your network;
  • Delivers analysis on what’s happening in your network and whether you should be worried; and
  • Provides a full lifetime hardware warranty with next-day advanced replacement.

The ControlScan team has my back…They're out there providing continuous security and compliance support to our 22 stores so that we can focus on building and expanding our business.

— Russ Boisvert, HR and IT Director for Cary Keisler, Inc.

An MSSP that’s got your back

The ControlScan UTM Firewall service is the best of breed managed security solution tailored for your organization. ControlScan is a Managed Security Services Provider (MSSP) and specializes in delivering the technical expertise and security know-how required to keep your organization secure and compliant. We offer custom solutions and additional features, including wireless access points and 3G/4G failover service, to accommodate the unique needs of your practice or organization regardless of size.

As your MSSP partner, we alleviate the administrative burden resulting from the ongoing management of a UTM firewall device and work to ensure the security of your network. The Managed Security Service benefits of the ControlScan UTM Firewall include:

  • Decreased network management costs;
  • Ongoing monitoring and real-time response to alerts and threats;
  • Reduced risk of malware exposure to critical systems;
  • Limited transaction loss through up-time monitoring and fail-over internet connections; and
  • Reduced scope of compliance by isolating critical systems within the network.