- Leverage your own hardware (x86_64)
- Efficient resource requirements
- Flexibility to change with your business needs
- Supports wide range of hardware and components
- No operating system required (included)
- High availability (supported)
Turn any PC into a UTM Appliance
The software appliance is ideal for those who are looking to leverage existing hardware (x86_64) for their networking and security needs.
The Endian UTM Software instantly converts any existing hardware (x86_64) into an Endian UTM appliance. Unleash the power of Endian UTM using your preferred hardware to provide comprehensive network security for your business.
The Endian UTM family is built for business with a comprehensive feature set that provides a suite of advanced network security. Protect your network and users from advanced threats (malware, ransomware, phishing, etc). Allow users to work from anywhere securely with remote user access. Visualize and monitor everything like never before.
Highlights
Requirements and Compatibility
EndianOS UTM must be installed onto a dedicated machine with at least 2 NICs.
The table below provides some recommended hardware specifications but remember that each network is different.
System Requirements | 10 - 50 devices | 100 - 250 devices | 500 - 2,500 devices |
Architecture | x86_64 architecture | x86_64 architecture | x86_64 architecture |
Cores | 2 cores | 4 or more cores | 8 or more cores |
Memory | 4GB | 8GB | 32GB |
Hard Drive | 32GB | 256GB | 1TB |
- For software Raid1 (mirroring) two disks of the same type are required
- Most common Network Interface Cards are supported including Gigabit and fiber NICs
- For users looking for a Hardware solution our portfolio includes the Endian Mini, Endian Mercury and Endian Macro
EndianOS 6.6 Release note
The Endian 6.6.0 release marks the completion of the EndianOS 6 platform for both UTM and Switchboard products by restoring the Hotspot (UTM) and Management Center (Switchboard).
EndianOS UTM Highlights
At the core of the Endian ecosystem is EndianOS which powers the entire Secure Digital Platform. A security focused operating system built to provide the complete networking, security and connectivity stack in an intuitive and easy to operate solution.
Zero Trust Architecture
Enforce fine-grained access and authorization policies to reduce attack surface. Monitor and audit access records for compliance efforts.
Microsegmentation
Define network zones and firewall policies to protect critical IT assets and interconnect different segments via secure pathways (NAT & VPN).
Threat Management
Detect and stop advanced threats and attacks from infiltrating your business network using our multi-faceted security toolset.
Edge Computing
Manage edge applications to simplify software distribution and enable third party software for analytics, monitoring, automation and more.
Work from Anywhere
Securely support all work environments including Work from Anywhere with powerful, easy to use VPN and Bring Your Own Device (BYOD) capabilities.
Secure Web and Mail Communication
Protect your employees and keep your business network safe from threats like phishing, ransomware and other malware. Enforce compliance with policies that maximize productivity and reduce downtime.
Network Visibility and Monitoring
Endian Network Awareness provides visibility to discover and protect against threats and identify network bottlenecks or inappropriate activity.