NG-UTM+
Your network and all your digital assets will be vulnerable to cyber threats if you do not have the right security solution in place. Merely having a firewall with an anti-virus software is not enough. To ensue you are fully protected, you need Network Box’s all-in-one Unified Threat Management plus (UTM+) protection.
Our vision as Yelbridges is to give our clients the best and solutions that are cost effective and all inclusive.
LEARN MOREBUSINESS SPECIFIC
The Network Box UTM+ solution uses a multi-layered security approach to effectively safeguard your network from both incoming, and outgoing threats.

SMALL BUSINESS SOLUTION
Secure your small business or branch office with enterprise quality protection. Designed to protect small offices, home offices, retail outlets, restaurants, logistics operations, and other smaller sites, which require either Unified Threat Management Plus (UTM+), or Virtual Private Network (VPN) protection.
Learn More
MEDIUM BUSINESS SOLUTION
Cutting edge, high performance hardware for medium sized organizations. The Network Box M-295i and M-395i units are designed to offer near Enterprise RAM and HDD capacity, and CPU performance for medium-sized companies.
Learn More
ENTERPRISE SOLUTION
Designed to protect enterprises, allowing for the highest performance possible. The Network Box E-Series (E-1000i, E-2000i, and E-4000i) are designed to protect Enterprises. Supporting massive RAM and HDD capacities, the E-Series provides the highest performance possible from a single Network Box unit.
Learn MoreMULTI-LAYERED APPROACH
The Network Box UTM+ solution uses a multi-layered security approach to effectively safeguard your network from both incoming, and outgoing threats.
HYBRID FIREWALL
The firewall is quite often the first line of defence against cyber attacks. Unlike most other firewalls, however, Network Box utilizes a Hybrid Firewall to effectively protect your servers and workstations from malicious probes and unauthorized access.
INTRUSION DETECTION/PREVENTION SYSTEM
Tightly integrated with the firewall, the Network Box Intrusion Detection and Prevention (IDP) system monitors and analyzes your network for signs of intrusion. If an intrusion attempt is detected, it is logged, and the system can be set to actively block the threat.
VIRTUAL PRIVATE NETWORK (VPN)
The Network Box Virtual Private Network (VPN) engine secures connections between Internet end points to ensure data remains secured and confidential during Internet exchange.
CONTENT FILTERING
Web Content Filtering engine, S-Scan, is designed to help organizations block users from accessing undesirable web content. With a detection rate of 98.7%* it offers excellent performance in terms of speed, coverage and web accuracy.
WEB APPLICATION FIREWALL (WAF)
The WAF engine protects web servers against web application based attacks, including the OWASP Top 10 as standard. It also allows you to have a wide range of options for blocking and logging traffic as it passes through the WAF rules system.
DATA LEAKAGE PREVENTION
The Network Box DLP engine scans and block outbound SMTP mail that may contain sensitive materials. This can include: your client information, account details, designs, commercial secrets, medical records as well document files, credit card numbers etc as specified within company policies
ZERO-DAY ANTIMALWARE
The Network Box Zero-Day Anti-Malware engine, Z-Scan, is an in-the-cloud defence shield that provides protection against the latest zero-day threat. Z-Scan operates by continually analysing all the threat information obtained, in real-time, from more than 250,000 virtual honey-pots deployed in the cloud, and releasing its own signatures to protect against these threats within seconds.
ANTI SPAM/MALWARE
The Network Box Anti-Malware system provides 18 anti-malware engines, running over 24.8 million signatures, to identify and prevent viruses, trojans, worms and other malicious software, from infecting your networked systems or networked smart devices. In addition to spam detection, the system also comprehensively scan emails for malware, intrusion, and company policy conformance.