Virtual UserGate Log Analyzer can be deployed on the customer's virtual infrastructure. All hypervisors are supported, including VMware, Hyper-V, Xen, KVM, OpensStack, and VirtualBox. The functionality of our virtual solution is completely equivalent to that of the UserGate hardware system. |
|
Fast Deployment Time
The use of virtual infrastructure allows for high mobility and flexibility. A virtual image can be deployed in the shortest possible time. This can be essential both for initial installation and system recovery after a crash occurs.
Savings on Investments in Hardware
Virtual solutions work on the customer's existing infrastructure. At the same time, there is no need to purchase and support new expensive network equipment, and the risks associated with the sudden failure of any components are significantly reduced.
Scalability Without the Need to Change Hardware Platforms
Expanding resources that are already in-use or adding new virtual machines allows you to quickly scale up.
UserGate Log Analyzer VE6PerformanceStorage: up to 6 TB Number of records per second: 160 000 Estimated log storage time: 1 000 days Size of OrganizationRecommended number of users: up to 1 000 Equipment SpecificationsProcessor, number of cores: 10 RAM: from 32 GB and more |
UserGate Log Analyzer VE14PerformanceStorage: up to 14 TB Number of records per second: 260 000 Estimated log storage time: 1 400 days Size of OrganizationRecommended number of users: up to 3 000 Equipment SpecificationsProcessor, number of cores: 12 RAM: from 32 GB and more |
UserGate Log Analyzer VF25PerformanceStorage: up to 25 TB Number of records per second: 530 000 Estimated log storage time: 1 300 days Size of OrganizationRecommended number of users: up to 10 000 Equipment SpecificationsProcessor, number of cores: 32 RAM: from 64 GB and more |
|
Reduction of the load on UserGate gatewaysLog processing and report generationConsolidation of logs from several gateways for general analysis |
Option for in-depth loggingOption for increasing the size of the store on LogAn serversAbility to collect and analyze information from third-party devices |