Collax Security Gateway CSG-BGW-0010-01 Leaflet

Product codes
CSG-BGW-0010-01
Page of 2
1.  Protects as an All-in-One solution
against all internet threats
2.  Security based on Linux and Open Source
3.  Administered without Linux know-how
4.  Consistent, intuitive graphical user interface
5.  Fast and efficient configuration
with the help of wizards
6.  Hourly updates of the virus signatures
7.  One update for all security services
8.  Integrates with all existing networks 
9.  Subscriptions keep costs transparent
10. Investment protection (Update and Upgrade Services)
Some good reasons to make the Collax Security
Gateway your solution of choice:
The Bodyguard
for your Company Network  
We are all familiar with such internet threats: hacker attacks,
Trojan horses, worms, viruses, spyware, spam and phishing.
Your mind will be put at rest when you know that a reliable
bodyguard keeps all these intruders from getting to your
company; that they simply will not get past the front door.
Collax’s competent security technology know-how has
guaranteed secure IT networks for several years. 
Simply Linux for your security
The Collax Security Gateway is administered with a user-
friendly graphical user interface, which in turn is operated by
Linux and Open Source software. Without dedicated Linux
knowledge you can benefit from the power of this secure and
stable software. Especially small to medium sized companies
benefit from Linux and Open Source use as an effective way
to reduce IT costs. The Collax Security Gateway is available
as software, or as a Plug-and-Play Appliance.
Collax’s Unified Threat Management (UTM)
As a UTM solution the Collax Security Gateway takes on the
security of your web, e-mail and network. All functionalities are
available on a single administrative platform. The advantage is
user flexibility; you can opt to use all the available security
The Collax Security Gateway offers a
comprehensive security package with the
best available software and protects your
complete network against internet threats
such as malware and hackers.
services of the Collax Security Gateway, or choose to apply
the product to a specific task. In addition, the Collax Security
Gateway manages the complete data traffic through a Traffic
Management function consisting of Traffic Shaping, Link
Fail-over and MultiWAN.
The bodyguard for hacker attacks and malware 
Intrusion Detection (IDS) and Intrusion Prevention Systems (IPS)
detect and block attack signatures on the company network.
Firewall configuration errors, which often offer hackers a back
door to your network, are avoided with Collax’s Firewall-Matrix.
Integrated package filters and Stateful Inspection monitor the
in- and outgoing data for hazardous code. All web requests and
answers are checked by the web proxy server. Access to online
shops and auction sites are denied by the web content filter*.
The complete e-mail traffic including attachments are checked
on various levels for hazardous code**. This also works for
web traffic; with the combination of multiple detection processes
the Collax Security Gateway offers optimized protection against
spam and phishing - Realtime Blocklists, Greylisting, Online
Blacklists (DNS-Lists), Spam Heuristics, network-based
detection, attachment filters and freely definable filters are
implemented technologies. With the Collax Security Gateway
you can establish a secure VPN in a fraction of time. Data
encryption is based on PPTP, L2TP or the IPSec-Standard.***
The Collax Surf Protection powered by Cobion is available as an option.
** 
The Collax Virus Protection is available as an option.
***
The VPN Client by NCP is available as an option. 
Protection
Prevention
Connectivity
Stateful Inspection Firewall
Application Proxies
Virus Filter
Spam Filter
Content Filter
Anti-Phishing
Intrusion Prevention
Day Zero Technologies
Heuristics
Firewall Matrix
Internet Access
Routing
Traffic Shaping
VPN
NAT
Link Fail-over
VLAN
MultiWAN
Graphical User Interface
Administration I Update-Management I Monitoring