Find out what your peers are saying about Check Point Software Technologies, Cisco, Sophos and others in Unified Threat Management (UTM).
A powerful solution for network security, providing organizations with the tools they need to protect their networks, enforce security policies, and optimize network performance.
Untangle NG Firewall is an open-source firewall and gateway security platform that helps keep networks safe while accessing the internet. It offers a free core firewall platform with paid add-ons, and a cloud-based management platform with a variety of deployment options for smaller teams. The solution also has a cloud-based management console for remote management that can either be deployed on premises or as SaaS, and virtualized or cloud-based. It also has flexible deployment options, including third-party hardware, as a virtual machine, or as a turnkey appliance. Untangle NG Firewall is ideal for small IT teams with limited budgets.
Untangle NG Firewall Features
Untangle NG Firewall has many valuable key features. Some of the most useful ones include:
Untangle NG Firewall Benefits
There are many benefits to implementing Untangle NG Firewall. Some of the biggest advantages the solution offers include:
Reviews from Real Users
Untangle NG Firewall is a solution that stands out when compared to many of its competitors. Some of its major advantages are that it is easy to use, has good features, including VPN, reporting, alerting, and filtering, and can be installed on existing hardware.
“It is very easy to use. The user interface is very straightforward. It may not be as fancy as some of the ones I've seen, but it's very straightforward. It's very easy to find what you need, and it's very easy to get things done,” says Josh E., CEO at DragonTech IT Services, Inc.
Barry A., Owner at ThinkEzIT, says, “It has good VPN features, helpful reporting and alerting, built-in content filtering, and excellent support.”
PeerSpot user Victor O., Director at Kisii County Government, explains, “What I like about this product, which is the reason that we continue to use it, is that you can install the software version on your own hardware. In case there is a problem with the hardware, we can just install the firewall in another machine and restore the configuration.”
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.