UTunnel VPN and ZTNA

UTunnel VPN and ZTNA

Secubytes LLC
+
+
Visit Website
Visit Website

Platforms Supported

Windows
Mac
Linux
SaaS / Web
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
SaaS / Web
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT professionals and businesses

Audience

UTunnel is a Business VPN, Zero-Trust Network Access, and Mesh Networking solution tailored for small and medium-sized businesses (SMBs), providing secure remote access and seamless network interconnectivity.

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

$6/user/month
Free Version
Free Trial

Reviews/Ratings

Overall 4.0 / 5
ease 4.0 / 5
features 4.0 / 5
design 4.0 / 5
support 3.0 / 5
Read all reviews

Reviews/Ratings

Overall 4.8 / 5
ease 5.0 / 5
features 4.8 / 5
design 4.9 / 5
support 4.6 / 5
Read all reviews

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Cisco
Founded: 1984
United States
umbrella.cisco.com/solutions/web-content-filtering

Company Information

Secubytes LLC
Founded: 2019
United States
www.utunnel.io

Alternatives

Alternatives

SpamTitan

SpamTitan

TitanHQ
NordLayer

NordLayer

Nord Security

Categories

Categories

Managed DNS Features

Anti-Malware
Change Management
DDoS Protection
Disaster Recovery
DNS Failover
DNS Propagation
Global DNS Network
Intelligent Traffic Routing
Load Balancing
Reporting / Analytics
Secondary DNS
Web Application Firewall (WAF)

Web Content Filtering Features

Antivirus
Automated Blacklist
Browser-based Management Portal
Category / Keyword Filters
LDAP Integration
Multi-Language Filtering
Reporting / Analytics
Roles / Permissions
SSL Inspection
Time-based Controls
VPN Blocking
White Label
Whitelisting

Cloud Security Features

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security Features

Access Control
Analytics / Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Cloud Management Features

Access Control
Billing & Provisioning
Capacity Analytics
Cost Management
Demand Monitoring
Multi-Cloud Management
Performance Analytics
SLA Management
Supply Monitoring
Workflow Approval

Endpoint Protection Features

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

IT Management Features

Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring

Network Access Control (NAC) Features

Authentication
Authorization
Automated Hotfix / Updates
Centralized Policy Management
Dashboard
Device Auto-Provisioning
Device Self-Registration
Posture Assessment
Quarantine / Remediation
Secure Guest Access

Remote Work Features

Collaboration
Credential Management
Electronic Signature
Employee Monitoring
Live Chat
Meeting Management
Project Management
Remote Access
Remote Support
Screen Sharing
Softphone
Task Management
Time Zone Tracking
Video Chat
Web Conferencing

VPN Features

Anonymous Browsing
DNS Leak Protection
For Digital Security
For Financial Security
For Gaming
For Streaming
Kill Switch
Multi-Language
Multi-Protocol
Peer-to-Peer
Policy Management
Remote Access
Web Inspection
White Label

Integrations

Akamai
Amazon Web Services (AWS)
Axonius
Chronicle SOAR
Encapto
Google Cloud Platform
JupiterOne
Kamatera
Linode
Mandiant Digital Risk Protection
OctoXLabs
Okta
OneLogin
OpenDNS
Recorded Future
Splunk SOAR
Swimlane
ThreatAware
Vultr
Zoho One

Integrations

Akamai
Amazon Web Services (AWS)
Axonius
Chronicle SOAR
Encapto
Google Cloud Platform
JupiterOne
Kamatera
Linode
Mandiant Digital Risk Protection
OctoXLabs
Okta
OneLogin
OpenDNS
Recorded Future
Splunk SOAR
Swimlane
ThreatAware
Vultr
Zoho One