Demand for Security Appliances are on the Rise

padlock sitting on top of a keyboard

Security Solutions

UNICOM Engineering security appliance monitoring

30+ Leading Security Software Providers Trust UNICOM Engineering to Deploy Their Solutions via Security Appliances

Services that Deliver a Competitive Advantage

The Ideal Solution

Deliver on a Purpose-Built Security Appliance

For many ISVs, the ideal approach to software delivery is the appliance model. Purpose-built appliances are simple for enterprise customers to install, run, and manage. They provide the reliable, secure, and trouble-free operation that customers expect.

UNICOM Engineering security appliances
Our appliances platforms are ideal for the following types of information security applications:
  • Unified threat management
  • Malware isolation & analysis
  • Network monitoring
  • Reporting & forensics
  • Secure email/web gateway
  • Single sign-on/key management
  • SIEM
  • End point security

Industry platforms

S-1300 Appliance Platform – Based on Intel Goldmont Microarchitecture Atom

S-1300


Processor

Supports a single Denverton-NS 16-Core or 8-Core SoC | C3958, 16-core, 2.0 GHz, 31W | C3708, 8-core, 1.7 GHz, 17W

Intel Microarchitecture

Goldmont

Memory

Up to 4 DIMMs slots, DDR3 up to 2400 MT/s | Up to 64 GB (max) | DIMM sizes: 8 GB, 16 GB

Disk

Up to 2x2.5” SATA drive (fixed)

Expansion

Single PCIe x8 slot (x8)

Special features

Single AC PSU


S-1500 – 1U Rackmount SAS/SATA Server Platform

S-1500


Processor

Supports Intel Atom Denverton-NS SoC C3000 Series | C3958, 16-core, 2.0 GHz, 31W | C3708, 8-core, 1.7 GHz, 17W

Intel Microarchitecture

Goldmont

Memory

Up to 4 DIMMs slots, DDR4 up to 2400 MT/s | Up to 128 GB (max) | DIMM sizes: 8 GB, 16 GB, 32GB

Disk

Up to 4 hot swap enterprise class SAS / SATA drives

Expansion

Single PCIe x8 slot (x8)

Special features

Redundant AC PSU


S-1550 R5 - Enterprise Computing Systems

S-1550 R5


Processor

Single 4-to-8 Core Intel Xeon E-2200/2100 series

Intel Microarchitecture

Coffee Lake Processor

Memory

Up to 4 DIMMs Double Data Rate 4 | Up to 64 GB DDR4-2666 MT/s ECC Registered | DIMM Sizes: 8 GB, 16 GB

Disk

Up to 10 hot swap Hard Disk Drives (HDD) / Solid State Drives (SSD) Embedded RAID technology for SATA | RAID levels 0/1/5/10

Expansion

Max 3 PCIe Gen3 add-in cards

Special features

Dual 10GbE LAN ports, Dedicated IPMI 2.0 LAN Port | Four USB 3.0 ports | Redundant 650W AC power supply units


S-1600 R5: Branch Office Server & Remote Application Platform

S-1600 R5


Processor

Single 8-to-16 Core Intel Xeon D-2100 series System-on-Chip (SoC)

Intel Microarchitecture

Intel® Xeon® D Based Servers

Memory

Up to 4 DIMMs Double Data Rate 4 | Up to 256 GB DDR4-2400MT/s ECC Registered | DIMM Sizes: 8 GB, 16 GB, 32 GB

Disk

Embedded RAID technology for SATA | RAID levels 0/1/5/10

Expansion

Up to 10 hot swap Hard Disk Drives (HDD) / Solid State Drives (SSD)

Special features

Three PCIe Gen3 slots | Quad GbE, Dual 10GbE, Dual 10GbE SFP+ LAN ports


The servers above represent a few of the purpose-built appliances well suited for information security applications. We have strong technology partner relationships with industry leaders like Dell, Intel, Supermicro, Lenovo, and HP from which to design a solution that optimizes your application.

dell logo
intel logo
hp logo
supermicro logo

The World Needs You Now

Your application could save thousands of companies from falling victim to the next threat. Don’t they deserve to benefit from your solution now? The quicker we start to engage, the faster this can happen. We’ve provided some baseline information above, but we are much more engaging in person. Let’s discuss the technology and services that will optimize your application and drive performance.