Unified Threat Management (UTM) relates to a single, centralised security solution that provides a range of different security functions. This is typically in the form of a UTM appliance which features subscription services which provide protection against a range of different threats.  

Labyrinth are WatchGuard Gold Partners and recommend WatchGuard UTM appliances which are in the form of a hardware firewall and security services. 

This is by no means an exhaustive list of the different UTM security services available through WatchGuard and other security vendors. Labyrinth can recommend a UTM appliance and services that are right for your business.

WatchGuard firewalls are available with a range of different security subscriptions but we generally recommend the ‘Total Security Suite’ which is all inclusive of the above features in addition to providing updates and next day hardware replacement in the event of a failure.  

Gateway Antivirus

Also using continually updated signatures, gateway anti-virus helps block known malware and spyware

Application Control

Application control allows you to restrict, block or allow different applications on a granular level. You can also see in real-time who is accessing what

Threat Detection and Response

TDR correlates network and endpoint security events by using intelligence to detect and take immediate action against threats

WebBlocker URL Filtering

This blocks users and devices from accessing malicious or inappropriate content. You can select which types of website you wish to block

Intrusion Prevention

Intrusion prevention scans all firewall traffic and provides real-time prevention against any threats using continually updated signatures

Network Discovery

Network discovering provides a visual map of all the nodes on your network. This will help you identify any potential areas of risk

Reputation Enabled Defence Service (RED)

RED protects users from botnets and accessing malicious websites by looking up the website reputation

ATP Blocker

ATP blocker is an advanced malware protection feature which helps detect and prevent the most sophisticated types of attack such as ransomware and zero day threats (for example, malware that has not yet been discovered)

DNSWatch

This tool helps prevent malware by blocking malicious DNS requests and redirecting users to training material. This product is also available in the form of Windows software to protect devices used outside of the office.

Your Unified Threat Management Journey Starts Here

Our approachable staff will use plain English and not confuse you with technical jargon. We will never make you sign a long contract and we guarantee to respond within an agreed timeframe. And we will never oversell and will always work on the principle of ‘best advice’.

Frequently Asked Questions

  • Through our managed security service plans we will look after the core elements of your cyber security systems and help fulfil the role of CISO (Chief Information Security Officer), giving you peace of mind that your data and systems are protected. Many of our managed security services are also bundled into our core Managed IT Support plans. We will recommend a plan that best fits your needs and budget, so whether you have 5 or 100+ employees we can deliver a managed security service that properly balances likelihood vs impact vs cost. We’ll assess the impact cyber crime might have on your business, and take every possible measure to prevent anyone falling victim to them, and deliver this by cyber security awareness programs, system updates, data backups, and being fully conversant with the latest known threats, risks and vulnerabilities. By doing this we will always be able to recommend and deliver the software and hardware necessary to reduce the potential for security breaches.

  • Yes, that goes without saying. But we would stress that we always want to anticipate potential faults and resolve them before they become a serious issue. Patch or fix deployment will, if possible be done when the machine is not is use, and system updates, the enhancement of security features and proactive procedures are always carried out to help eliminate data loss.