Complete set of Unified Threat Management (UTM) security features
Centralized, policy-based management minimizes the chance of overlooking security holes by simplifying rollout and network-wide updates
Virtualization technologies make it easy for administrators to divide the network into secure segments for additional protection
Various high availability (HA) options offer the best redundant capabilties for any given network
Rapid-deployment features, including Auto Connect VPN and Dynamic VPN services, help minimize the administrative burden associated with widespread IPsec deployments