Kerio Control works comfortably in your existing IT environment -- whatever your needs. Choose the approach that best fits with your existing IT processes, infrastructure and organization.
Kerio Control brings together next-generation firewall capabilities -- including a network firewall and router, intrusion detection and prevention (IPS), gateway anti-virus, VPN, and web content and application filtering.
Link headquarters to remote users and branch offices securely and easily. Kerio’s own VPN tunneling with dead-simple setup requires minimal configuration, and provides a high-performance network connection. You can also use industry-standard IPsec/L2TP for connectivity from mobile devices or third-party firewalls.
View individual users’ Internet activity, refine traffic-shaping rules and more with automatic, detailed reports from Kerio Control Statistics sent to your email inbox.
Use insights from reporting to limit legal liability and improve productivity by blocking access to sites, applications and content categories or limiting it to specific time of day, users/user groups and user locations.
Easily prioritize and monitor network traffic to guarantee high-speed transmission for the most important traffic types. Internet Link Load Balancing optimizes Internet access by distributing traffic across multiple links.More info
Handle all administration and configuration activities from a customizable web-based console using your desktop or tablet. Quickly and securely access security settings, manage users and bandwidth, and set traffic policies from an intuitive interface.More info
Selectively block, allow or log access to 141 categories of web content and applications using Kerio Control Web Filter with application awareness. Keep bandwidth-hogging traffic like streaming video off your network or block peer-to-peer networks. Keep your users from visiting malware sites that are known to contain viruses and spyware or to engage in phishing or identity theft.More info
Kerio Control’s IPS adds a transparent layer of network protection, with Snort-based behavior analysis, and a regularly updated database of rules and blacklisted IP addresses from Emerging Threats.More info