Our features
No code integration
  • User-Friendly configuration process
    Selecta Networks is easy to configure and adapt to the network setup. There is no need to spend days configuring the process – a few hours and the service will be configured. If you need support, we are always available to help you.
    1
  • 24/7/365 Support
    Free support service is included in the Selecta Networks product. Our technicians with significant backgrounds are ready to support you in product configuration or usage. The chat with the Support can be started from the Selecta Network interface – just open the chat window from the right bottom corner.
    2
  • Robust documentation
    The documentation describes everything about the Selecta Networks server's initial setup and maintenance. We have complete documentation for each module, server management and possible troubleshooting scenarios. It is easy to start using and managing Selecta Networks with our documentation.
    3
Ransomware
  • Anti-Virus Scanning of Traffic
    Streaming scanning of downloaded files and scripts by ClamAV Anti-Virus. Blocking viruses before they reach the local network.
  • NGFW solution
    As a low level filtering Firewall can block network traffic based on the protocol, IP address, network port or other network packet parameters. Selecta Networks firewall can detect and block incoming threats as well as prevent devices within your network spreading the malware to other networks.
  • IPS & IDS systems
    As a low level filtering Firewall can block network traffic based on the protocol, IP address, network port or other network packet parameters. Selecta Networks firewall can detect and block incoming threats as well as prevent devices within your network spreading the malware to other networks.
Monitoring and Reporting
  • SEIM integration
    Is an ability to transfer all system logs to third-party information (Syslog Collector) or SIEM integrators.
    1
  • Zabbix integration
    Zabbix is an open-source enterprise-class distributed monitoring solution.
    2
  • SNMP integration
    This module allows you to monitor the operation of Selecta Networks using the SNMP protocol versions 1/2c and 3. To do this, you need to configure the login, password, and encryption key.
    3
  • Comprehensive reports
    Categorized reporting on web resources usage. Reports on allowed and blocked sites, a detailed log of time spent visiting resources. Customisable report according to needs.
    4
Flexible web-filtering
  • Content Filtering
    Internet access control with 500 million blocked addresses in 145 categories. The largest list of categories helps you prevent access to harmful sites while allowing access to educational resources, or social media. Protect your users from offensive information and keep access to well-proven sites.
  • WAF
    Protects internal web resources by using the Web Application Firewall when publishing them to the Internet. Filtering and protecting mail traffic for published mail servers. SafeUTM WAF is protecting the network traffic from vulnerable HTTP traffic from XSS attacks, SQL injection, etc.
  • Anti-Spam & Anti Phishing modules
    Tons of phishing, spam, etc emails are circulating through the world – our solution can protect your network from unwanted and harmful emails.
Threats protection
  • Application blocking
    Selecta Networks supports the user Active Directory, IP, VPN, web, MAC, and other authentication methods. SSO is avialabe via Acitive Directory
    1
  • VPN server
    IKEv2/IPsec, Wireguard, SSTP support of site-to-site and client-to-site connections. Support for connecting routers: Mikrotik, D-Link, Asus, Keenetic.
    2
  • Anti-Spam & Anti Phishing modules
    Tons of phishing, spam, etc emails are circulating through the world – our solution can protect your network from unwanted and harmful emails.
    3
Easy user management
  • Integration into Network Infrastructure
    DPI system which allows users to filter and block network access to particular apps like Youtube, Skype, TikTok, Netflix for certain users. DPI system analyzes traffic source and type and blocks it if needed.
  • Blocking Anonymizers
    Blocking attempts to bypass content filtering systems using proxy servers, browser plug-ins, TOR and VPN.