Kerio Control Box 3110, 40 users K27-121007 データシート
製品コード
K27-121007
Connect. Communicate. Collaborate. Securely. | 1-888-77-KERIO | www.kerio.com
Software. Hardware. Virtual Appliance.
Flexible deployment options
•
Whether using a dedicated server,
virtualized infrastructure, or Kerio Control
Box hardware appliance, organizations can
deploy their firewall to meet their unique
security and performance requirements,
and easily scale up as their needs change.
virtualized infrastructure, or Kerio Control
Box hardware appliance, organizations can
deploy their firewall to meet their unique
security and performance requirements,
and easily scale up as their needs change.
Intrusion Prevention System
Monitor network communication
to identify suspicious activity
•
Transparently monitors inbound and
outbound network communication.
outbound network communication.
•
Protects servers behind the firewall from
unauthorized connections, typically
originated by an Internet bot or hacker
trying to exploit an available service.
unauthorized connections, typically
originated by an Internet bot or hacker
trying to exploit an available service.
•
Works in tandem with the firewall and
content filtering capabilities to prevent
malware on the network.
content filtering capabilities to prevent
malware on the network.
Kerio Web Filter
Strong protection against malware
•
Prevents users from visiting websites that
are known to contain malicious content,
including viruses, spyware, Trojans, or web
pages that engage in phishing attacks or
online identity thefts.
are known to contain malicious content,
including viruses, spyware, Trojans, or web
pages that engage in phishing attacks or
online identity thefts.
•
Blocks over 53 categories of web content
that may have an adverse effect on
both the productivity and security of the
network.
that may have an adverse effect on
both the productivity and security of the
network.
•
Allows administrators to create access
policies that will prevent selected users
from using popular web-based IM clients
or social networking sites.
policies that will prevent selected users
from using popular web-based IM clients
or social networking sites.
Gateway virus scanning
Protection in real time
•
Utilizes massive computing power of multi-
core processors and custom hardware
configurations.
core processors and custom hardware
configurations.
•
Allows for real-time operation of anti-virus
engine, providing maximum protection
from viruses and worms.
engine, providing maximum protection
from viruses and worms.
•
Embeds Sophos Anti-Virus for seamless
integration, allowing administrators to
create and update security policies and
deploy them across multiple groups
simultaneously.
integration, allowing administrators to
create and update security policies and
deploy them across multiple groups
simultaneously.
•
Scans on many critical web and email
protocols, including SMTP, POP3, FTP, and
HTTP, ensuring maximum security against
the latest viruses, spyware, software
vulnerabilities and other malicious code.
protocols, including SMTP, POP3, FTP, and
HTTP, ensuring maximum security against
the latest viruses, spyware, software
vulnerabilities and other malicious code.
VPN clients and services
Fast remote access from any OS
•
Accommodates organizations with
multiple branch offices by consolidating
their IT infrastructure into a single
manageable network using unlimited VPN
tunnels for both site-to-site and client-to-
site scenarios.
multiple branch offices by consolidating
their IT infrastructure into a single
manageable network using unlimited VPN
tunnels for both site-to-site and client-to-
site scenarios.
•
Provides both persistent and on-demand
modes with cross-platform flexibility
for employees or servers requiring fast
and secure remote access to network
resources.
modes with cross-platform flexibility
for employees or servers requiring fast
and secure remote access to network
resources.
•
Scans all VPN traffic with integrated anti-
virus component.
virus component.
•
Uses standard encryption algorithms to
meet versatile VPN needs: SSL for the
control channel (TCP) and Blowfish for the
data transport (UDP).
meet versatile VPN needs: SSL for the
control channel (TCP) and Blowfish for the
data transport (UDP).
Network analysis and reporting
Real insight into network activity
•
Displays detailed statistical and graphical
analysis reporting (Kerio StaR) on how
the organization’s internet, network, and
individual computers are used.
analysis reporting (Kerio StaR) on how
the organization’s internet, network, and
individual computers are used.
•
Gives IT staff the ability to understand and
correctly enforce access policies.
correctly enforce access policies.
•
Allows management to immediately
uncover hidden productivity losses, security
risks, or potential legal liability issues
stemming from misuse of IT resources.
uncover hidden productivity losses, security
risks, or potential legal liability issues
stemming from misuse of IT resources.
•
Provides secure access to all information
from any browser.
from any browser.
Industry certifications
About Kerio Technologies, Inc.
Innovative in Internet security since 1997, Kerio
Technologies, Inc. provides Internet messaging and
firewall software that is simple, stable, and secure.
Technologies, Inc. provides Internet messaging and
firewall software that is simple, stable, and secure.
Kerio is headquartered in San Jose, California, with
offices in New York, Great Britain, the Czech Republic,
Germany, and Russia. Technology partners include
Zvelo, Sophos, and Microsoft.
offices in New York, Great Britain, the Czech Republic,
Germany, and Russia. Technology partners include
Zvelo, Sophos, and Microsoft.
© 2010 Kerio Technologies, Inc. All rights reserved.
The names of actual companies and products
mentioned herein may be the trademarks of their
respective owners. Published 12/2010
The names of actual companies and products
mentioned herein may be the trademarks of their
respective owners. Published 12/2010
Kerio Control Box
Hardware Models
Hardware Models
Kerio Control Box 1110
Kerio Control Box 3110
Users Included
20 users
(add-on user licenses available)
40 users
(add-on user licenses available)
Software
Kerio Control with Sophos Anti-Virus and Kerio Web Filter
Features
Chassis
Desktop
1U Rack Mount Unit
Dimensions (in/mm)
10.7 x 7.7 x 1.7 in / 272 x 195 x 44 mm
16.8 x 10.7 x 1.7 in / 426 x 272 x 44 mm
Weight (lb/kg)
5 lb / 2.26 kg
15 lb / 6.8 kg
Ethernet
4 x 10/100/1000
8 x 10/100/1000
Power input
60W
200W
Compact Flash Disk
Industrial Grade 4 GB
Industrial Grade 8 GB
Memory
2 GB
2 GB
Processor
1.5 Ghz
Dual Core 2.6 Ghz
Warranty
Standard 1-year warranty
Standard 1-year warranty
Everything you like about Kerio Control software,
wrapped in performance optimized hardware.
Kerio Control Box.
Software system requirements
Server requirements
Pentium IV or compatible
CPU 1 GHz, 1 GB RAM, 8 GB HDD
1 Ethernet (10/100/1000) network interface
Windows 2000/XP/2003/Vista/2008/7 (32 or 64 bit)
CPU 1 GHz, 1 GB RAM, 8 GB HDD
1 Ethernet (10/100/1000) network interface
Windows 2000/XP/2003/Vista/2008/7 (32 or 64 bit)
Kerio VPN Client
Pentium III, 256 MB RAM, 10 MB HDD
Windows 2000/XP/2003/Vista/2008/7 (32 or 64 bit)
Debian 5.0, Ubuntu 8.04 (32-bit)
Mac OS X 10.4 or higher on Mac Intel
Windows 2000/XP/2003/Vista/2008/7 (32 or 64 bit)
Debian 5.0, Ubuntu 8.04 (32-bit)
Mac OS X 10.4 or higher on Mac Intel
Kerio Clientless VPN
Internet Explorer 7/8, Firefox 3, Safari 4
*Hardware models not available in all markets.