ICS CUBE - 5.2.5.180412
ICS CUBE is designed to address a broad scope of issues small or medium business faces when operating corporate network attached to the Internet. ICS CUBE goes beyond standard Unified Threat Management by providing security, visibility, access control, reporting and ready to use applications to corporate network.
ICS CUBE integrates seamlessly into most network topologies and environments, becoming internet gateway/router with firewall and VPN support.
ICS CUBE has flexible access control rules to create any type of corporate Internet use policy. It uses multiple types of authentication. Users and groups are subject to all sorts of rules using URLs, traffic categories, addresses, time, traffic limits, rate limits.
By extensive set of monitoring tools and reporting forms ICS CUBE exposes processes on the network boundary and allows for their management. Custom reports on traffic volumes, user activity and particular objects fetched, link loads and status can be used along with preconfigured ones.
ICS CUBE is equipped with preinstalled applications integrated with its management software and provides for corporate communications: mail server with antivirus and antispam, corporate web server, VoIP PBX, a number of technical and network management servers.
All management of ICS CUBE is done via web-based protected interface, which keeps track of all relations between components and hides complexity from the user. Remote offices can easily be controlled from just one ICS CUBE interface, no matter how many of them are installed in remote offices.
The UTM functions are realized by tightly integrated network firewall, intrusion protection system, web content filter, flow antivirus, mail antivirus and antispam, web application firewall and data loss prevention.
ICS CUBE trial software is available for free downloading. It installs itself automatically, turning a computer into a powerful UTM router and gateway between protected corporate network and the Internet.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .