Internet Security

Skip to Main Content »

Have a Question? Call Us!
Toll Free: 877.449.5102

Welcome to NTSecurity.com

You're currently on:

ProSecure UTM150 Unified Threat Management Appliance

The Netgear ProSecure UTM150 is Reliable, Affordable and Simple UTM Firewalls for 150+ User Network

Prosecure UTM 150

Prosecure UTM150 is the newest edition of the Prosecure UTM series of Netgear. It offers Best-of-breed Anti-malware Engine, ProSecure Patent PendingStream Scanning Technology, Distributed Spam Analysis Anti-spam Technology, Distributed Web Analysis URL Filtering, IM and P2P Application Control. in conjunction with a stateful packet inspection firewall.

» 900 Mbps Firewall Throughput
» 130 Mbps Anti-virus Throughput
» 65,000 Concurrent Connections
» 400 Mbps VPN Throughput
» 150 Site to Site VPN Tunnels

Request a Quote  

Download Datasheet 

11 Item(s)

per page
  1. ProSecure UTM150 Unified Threat Management Appliance

    » Recommend User Limit: 150
    » Maximum Speed: 900 Mbps
    » UTM Speed: 130 Mbps
    » Maximum VPN Speed: 400 Mbps
    » Concurrent Connections: 65,000
    » Site-to-Site VPN Tunnels:150
    » Includes:30 days of 8x5 support, optional UTM services
  2. ProSecure UTM150 Web, Email, & Maintenance Subscription - 1 Year

    1 year Web, Email, & Maintenance Subscription for UTM150 features:
    » 1 year of Web Threat Management Subscription
    » 1 year of Email Subscription
    » 1 year of Maintenance & Support Subscription
  3. ProSecure UTM150 Web, Email, & Maintenance Subscription - 3 Year

    3 year Web, Email, & Maintenance Subscription for UTM150 features:
    » 3 year of Web Threat Management Subscription
    » 3 year of Email Subscription
    » 3 year of Maintenance & Support Subscription
  4. ProSecure UTM150 Email Subscription - 1 Year

    1 year Email Subscription for UTM150:
    » For IMAP, POP3, and SMTP
    » Hourly spyware rule and definition updates
    » Hourly virus definition updates
    » Real-time Distributed Spam Analysis Updates
  5. ProSecure UTM150 Email Subscription - 3 Year

    3 year Email Subscription for UTM150:
    » For IMAP, POP3, and SMTP
    » Hourly spyware rule and definition updates
    » Hourly virus definition updates
    » Real-time Distributed Spam Analysis Updates
  6. ProSecure UTM150 - Unified Threat Mgmt Appliance Bundle - 1 year subscription

    » Recommend User Limit: 150
    » Maximum Speed: 900 Mbps
    » UTM Speed: 130 Mbps
    » Maximum VPN Speed: 400 Mbps
    » Concurrent Connections: 65,000
    » Site-to-Site VPN Tunnels:150
    » Includes:1 year of 8x5 support, UTM protection plus spam / email protection
    Yearly Renewal Starts at: $1,008.90. View All Renewals
  7. ProSecure UTM150 - Unified Threat Mgmt Appliance Bundle - 3 year subscription

    » Recommend User Limit: 150
    » Maximum Speed: 900 Mbps
    » UTM Speed: 130 Mbps
    » Maximum VPN Speed: 400 Mbps
    » Concurrent Connections: 65,000
    » Site-to-Site VPN Tunnels:150
    » Includes:3 years of 8x5 support, UTM protection plus spam / email protection
    Yearly Renewal Starts at: $1,008.90. View All Renewals
  8. ProSecure UTM150 Maintenance & Support Subscription - 1 Year

    1 year Support & Maintenance Subscription for UTM150 features:
    » 24x7 Support
    » Software maintenance & upgrades
    » Advanced Replacement
  9. ProSecure UTM150 Maintenance & Support Subscription - 3 Year

    3 year Support & Maintenance Subscription for UTM150 features:
    » 24x7 Support
    » Software maintenance & upgrades
    » Advanced Replacement
  10. ProSecure UTM150 Web Threat Management Subscription - 1 Year

    1 year Web Threat Management Subscription for UTM150 features:
    » For HTTP, HTTPS, and FTP
    » Hourly spyware rule and definition updates
    » Hourly virus definition updates
    » Real-time content filter database updates
  11. ProSecure UTM150 Web Threat Management Subscription - 3 Year

    3 year Web Threat Management Subscription for UTM150 features:
    » For HTTP, HTTPS, and FTP
    » Hourly spyware rule and definition updates
    » Hourly virus definition updates
    » Real-time content filter database updates

11 Item(s)

per page
Best-of-breed Anti-malware Engine
» Enterprise-class malware scan engine
» Up t400 times the coverage of legacy all-in-one solutions
» Over 1 million malware signatures
» Hourly automatic signature updates
» Zerhour heuristic based threat protection

ProSecure Patent Pending Stream Scanning Technology
» Data streams are processed as they enter the network
» Low latency Web traffic scanning

Distributed Spam Analysis Anti-spam Technology
» Hybrid in-the-cloud architecture
» Gathers threat data from over 50 million global sources
» New spam is classified and detected within minutes
» Nlearning period, works right out of the box
» Minimal false positives

Distributed Web Analysis URL Filtering
» Hybrid in-the-cloud architecture
» Hundreds of millions of categorized URLs
» Real-time classification int64 categories

IM and P2P Application Control
» Blocks access tpublic IM clients
» Blocks peer-to-peer (P2P) clients
» Preserve productivity and save bandwidth

SSL & IPsec VPN Remote Access
» SSL VPN - clientless remote access, anywhere, anytime
» IPsec VPN - secure site-to-site tunnels and client-based remote access
» Nadditional licenses tpurchase

Built-in SPI Firewall
» Dual WAN Gigabit Firewall* provides load balancing and failover
» Four Gigabit LAN ports, one configurable hardware DMZ port
» Stateful packet inspection (SPI)
» Denial-of-service (DoS) protection
» IPS prevents hackers from penetrating the network perimeter

Comparison Between Prosecure UTM Series

Compare the NETGEAR ProSecure all-in-one gateway security hardware appliance models for businesses up to 150 concurrent users in size. The ProSecure UTM combines application proxy firewall, VPN, zero day protection, anti-virus, anti-spyware, anti-spam, intrusion prevention, and URL filtering for total protection.
UTM Models UTM 5 UTM 10 UTM 25 UTM 50 UTM 150
  Prosecure UTM5 Prosecure UTM10 Prosecure UTM25 Prosecure UTM50 Prosecure UTM150

Sizing Guidelines

Average Anti-virus Throughput¹ 15 Mbps 20 Mbps 25 Mbps 45 Mbps 130 Mbps
Stateful Packet Inspection Firewall Throughput¹ 90 Mbps 90 Mbps 127 Mbps 400 Mbps 900 Mbps
Maximum VPN Throughput¹ 40 Mbps 50 Mbps 70 Mbps 200 Mbps 400 Mbps
Maximum Concurrent Connections¹ 8,000 12,000 27,000 40,000 65,000
VLANs 255 255 255 255 255

Content Security

Web and Email Scanned Protocols HTTP, HTTPS, FTP, SMTP, IMAP, POP3
Stream Scanning Included Included Included Included Included
Inbound and Outbound Inspection Included Included Included Included Included
Signature-Less Zero Hour Protection Included Included Included Included Included
Malware Signatures 1.2 Million 1.2 Million 1.2 Million 1.2 Million 1.2 Million
Automatic Signature Updates Hourly Hourly Hourly Hourly Hourly
Web Content Filters Filter By: HTML Body Keywords, File Extension
Web Object Filters ActiveX, Java™, Flash, JavaScript™, Proxy, Cookies
Email Content Filters Filter By: Subject Keywords, Password-protected Attachments, File Extension, File Name
Distributed Spam Analysis Included Included Included Included Included
Distributed Spam Analysis Supported Protocols SMTP, POP3
Anti-spam Real-time Blacklist (RBL) Included Included Included Included Included
User Defined Spam Allowed/Block Lists Filter By: Sender Email Address, Domain, IP Address, Recipient Email Address, Domain
Distributed Web Analysis w/ 64 categories Included Included Included Included Included
Instant Messaging (IM) Control MSN® Messenger, Yahoo!® Messenger, mIRC, Google Talk
Peer to Peer (P2P) Control BitTorrent™, eDonkey, Gnutella
Maximum Number of Users Unlimited

Firewall Features

Stateful Packet Inspection (SPI) Port/Service Blocking, Denial-of-service (DoS) Prevention, Stealth Mode, Block TCP Flood, Block UDP Flood, WAN/LAN Ping Response Control
Intrusion Detection & Prevention (IPS) Included Included Included Included Included
WAN Modes NAT, Classical Routing
ISP Address Assignment DHCP, Static IP Assignment, PPPoE, PPTP
NAT Modes 1-1 NAT, PAT
Routing Static, Dynamic, RIPv1, RIPv2
VoIP SIP ALG
DDNS DynDNS.org, TZO.com, Oray.net
Firewall Functions Port Range Forwarding, Port Triggering, DNS proxy, MAC Address Cloning/spoofing, Network Time Protocol NTP Support, Diagnostic Tools (ping, DNS lookup, trace route, other), Auto-Uplink on Switch Ports, L3 Quality of Service (QoS), LAN-to-WAN and WAN-to-LAN (ToS)
DHCP DHCP Server, DHCP Relay
User Authentication for VPN Active Directory, LDAP, Radius, Local User Database
Security Policies Based on Active Directory with Single Sign-On (SSO) n/a n/a n/a Included Included
PCI Compliance Two Factor Authentication Support Included Included Included Included Included

VPN

Site to Site VPN Tunnels 5 10 25 50 150
SSL VPN for Remote Access 2 5 13 25 75
IPsec Encryption Algorithm DES, 3DES, AES(128,192,256 bit)/SHA-1, MD5
Key Exchange IKE, Manual Key, Pre-Shared Key, PKI, X.500
IPsec NAT Traversal (VPN Passthrough) Included Included Included Included Included
iPhone Native VPN Client Support Included Included Included Included Included
SSL Version Support SSLv3, TLS1.0
SSL Encryption Support DES, 3DES, ARC4, AES(128,256bit)
SSL Message Integrity MD5, SHA-1, MAC-MD5/SHA-1, HMAC-MD5/SHA-1
SSL Certificate Support RSA, Diffie-Hellman, Self
SSL VPN Platforms Supported Windows 2000 / XP / Vista® (32bit), Windows 7 (32 and 64bit), Mac OS® X 10.4.x/10.6.x

Deployment

VLAN Support Included Included Included Included Included
Dual-WAN Fail-over n/a n/a Included Included Included
Intelligent Traffic Load Balancing n/a n/a Included Included Included
Configuration Wizards Setup, IPsec VPN, SSL VPN        

Logging and Reporting

Management HTTP/HTTPS, SNMP v2c
Reporting Summary Statistics, Graphical Reporting, Automatic Outbreak Alerts, Automatic Malware Notifications, System Notifications
Logging Traffic, Malware, Spam, Content Filter, Email Filter, System, Service, IPS, Port Scan, IM, P2P, Firewall, IPsec VPN, SSL VPN
Log Delivery Management GUI Query, Email Delivery, Syslog

Hardware

Gigabit RJ45 Ports WAN/LAN 1/4 1/4 2/4 2/6 4/4
DMZ Interfaces (Configurable) 1 1 1 1 1
Flash Memory/RAM 2 GB/512 MB 2 GB/512 MB 2 GB/1 GB 2 GB/1 GB 2 GB/1 GB
Administration Console Port RS232 RS232 RS232 RS232 RS232
USB Ports 1 1 1 1 1
Certifications ICSA: Anti-virus VPNC: AES Interop, Basic Interop Checkmark: Anti-Malware, Anti-Spam, Enterprise Firewall, VPN, IPS, URL Filtering
Major Regulatory Compliance FCC Class A, CE, WEEE, RoHS
Storage and Operating Temperatures Operating Temperature 0-45°C (32°-113°F),
Storage Temperature -20-70°C (-4°-158°F)
Humidity Operation 90% Maximum Relative, Storage 95% Maximum Relative
Electrical Specifications 100-240V, AC/50-60Hz, Universal Input, 1.2 Amp Max 100-240V,
AC/50-60Hz,
Universal Input,
1.0 Amp Max
Dimensions (W x H x D) cm 33 x 4.3 x 20.9 33 x 4.3 x 20.9 33 x 4.3 x 20.9 44 x 4.3 x 26.1 44 x 4.3 x 26.1
Dimensions (W x H x D) inches 13 x 1.7 x 8.2 13 x 1.7 x 8.2 13 x 1.7 x 8.2 17.3 x 1.7 x 10.3 17.3 x 1.7 x 10.3
Weight (kg) 2.1 2.1 2.1 2.9 2.9
Weight (lb) 4.6 4.6 4.6 6.4 6.4
Package Contents ProSecure UTM Appliance , Power Cable, Rubber Feet, Resource CD, Rackmount Kit, Warranty Card, Quick Installation Guide, Subscription Card (Bundles Only)
Hardware Warranty Lifetime
*Available on the UTM25 and UTM50
¹Throughput measured in a lab environment. Actual performance may vary.

Sizing Guidelines:

ProSecure™ UTM appliances are situated between an organization's internal network and the Internet. The UTM acts as a stateful packet inspection firewall, keeping track of TCP connection state for every connection that is maintained through the UTM. Moreover, the UTM manages an organization's Internet usage and protects these organizations from Internet borne malware, spam, viruses, and inappropriate web surfing. With the ProSecure™ UTM appliance sitting between the organization and the Internet, it is critical that the UTM appliance is sized appropriately and matches the performance needs of the organization.

There are no industry-standard metrics for determining the model to select, as every organization is unique and displays different network traffic characteristics. Moreover, the performance of the UTM can vary widely depending on a number factors including the complexity of the firewall rules loaded, the number of current active VPN users, the IPS signatures employed, the number of active connections used by each user, and a host of other metrics, including, last but not least, the number of protocols inspected by the Antivirus engine and the number of signatures applied to the AV engine.

As such, NETGEAR highly recommends that you contact your ProSecure™ authorized VAR who is well versed in UTM sizing to benchmark your organization and recommend the best model for your needs. That said, NETGEAR generally uses several specifications to roughly evaluate the applicability of an UTM appliance:

Firewall Throughput:

A starting point is to estimate the throughput your organization requires between its internal network and the Internet. As the UTM appliance sits between your internal network and the Internet, firewall throughput number is the total amount of traffic that can be passed with the UTM in place.

Concurrent Sessions:

Users typically engage in a host of activities that consume TCP sessions. Web browsing over HTTP and HTTPS, FTP file transfers, Email over POP3, SMTP, and IMAP, Instant Messenger, Peer to Peer Traffic, TELNET, SSH and streaming audio and video all consume TCP sessions.

On the average, "normal" users typically consume 100-300 active TCP sessions. Virus Infected PCs turned into zombies can often consume upwards of 1000 active TCP sessions, although ProSecure™ UTM appliances have administrator-definable limits to contain infected PCs from consuming an excessive number of TCP sessions.

Anti-Virus Throughput & Virus Coverage:

Anti-Virus scanning can be performed against files or data embedded in time-sensitive applications such as web browsing over HTTP(s) or in latency-tolerant applications such as Email. Because Anti-Virus speed is directly correlated to the number of signatures applied in the scanning process and in the protocols being scanned, Anti-Virus throughput can typically be inflated by reducing the signature set size or reducing the numbers of protocols scanned. Thus, Anti-Virus effectiveness is often a balance between speed and thoroughness. ProSecure™ UTM appliances employ signature sets that are up 400x larger than competing legacy small business UTM solutions while employing patent-pending Stream Scanning technology to vastly increase Anti-Virus throughput.

UTM Appliance Model Comparison

UTM Model Capacity UTM5 UTM10 UTM25
Firewall Throughput (Mb/s) 90 90 127
Concurrent TCP Sessions 8000 12000 27000
Anti-Virus Throughput (Mb/s) 15 20 25
Anti-Virus Signature Set Size 1 Million+ 1 Million+ 1 Million+
Recommended # of Users 1-5+ 1-15+ 15-30+