AST 2018 CHAMPIONS EDITION AST 2018 CHAMPIONS EDITION | Page 193

vanced threat protection, application-based shap- 2018 CHAMPIONS Edition ing for bandwidth optimization, and virtual pri- vate networks (VPN) in a simply powerful, affordable package. Volume 30 Untangle • Gold ‘ASTORS’ Award Winner • NG Firewall v14.0 • Best Network Security Solution While the 2015 U.S. OPM breach was one of the larg- est federal government data breaches to date, just ear- lier this year the city of Atlanta was hit by ransom- ware, severely impacting all parts of the city’s online systems and costing the city millions. While federal government agencies have the budget and resources to react to attacks, state and local gov- Known for simplifying network security, Untan- ernments must also take action to protect their net- works and sensitive information from attacks. gle’s NG Firewall delivers enter- prise-grade cybersecurity fea- tures in a package that is easy to purchase, configure, deploy and maintain for state and local government, educational institu- tions, nonprofit organizations as well as SMBs. Government agencies are often the target of sophisticated at- tacks, housing personal and sen- sitive information ideal for hack- ers to steal and sell. (See how Untangle’s NG Firewall software solution is different.) The adoption of mobile technology has rapidly in- creased following the Executive Order mandating Untangle provides a cost-effective, all-in-one solu- government agencies streamline to lower costs, tion for government agencies that includes content decrease delivery times, and improve the customer filtering, ransomware protection, malware and ad- experience, and government agencies are moving to an IT infrastructure where data is accessible to users on any device of their choice, requiring network administrators to shift from secur- ing devices to securing the data itself. (See how Untangle assists the CIty of Montebello’s manage various depts and sites.) NG Firewall is the solution of choice for thousands of organizations facing not only the challenges of network security, but also limited budgets, resources and in-house IT exper- tise. 193