Visit us at SPS IPC Drives 2018 and Start Your Digital Transformation

Start collecting your data from your machines in just a few weeks.

The IoT digital transformation is underway and we believe the Endian Connect & Analyze Platform is a key component to a successful transformation. We also know that this process can be part of a large and long-running project. So we’ve created a quick and easy solution to help jumpstart your IoT digitalization projects with our PoC (Proof of Concept) program.

Endian PoC Platform

The Endian PoC platform makes it easy to (a) collect and (b) analyze your IoT data from your field devices. The majority of the platform is securely hosted by Endian in our safe, secure, reliable cloud infrastructure.

 Are you ready for the Digital Transformation?
 Come and visit us – get your free ticket now: kostenlosen Tickets

Endian Firewall Community 3.3 released

The Endian Team is proud to announce the new
Endian Firewall Community release.

The latest release brings to our popular open source firewall many features: together with a new kernel that boosts performances and security, EFW 3.3 comes with an improved certificate management and Let’s Encrypt integration. You also get the possibility to remove kernel modules bundled within the system.

Download Endian Firewall Community 3.3

Here are other key features

Core Backup
bullet_green CORE-2608 Improvement: Add an option to GUI setting for the Management GUI HTTPS certificate

Core Hardware support
bullet_green CORE-2783 Improvement: Add kernel module rndis_host for LTE modem

Core Kernel
bullet_green CORE-2331 Improvement: Upgrade to kernel 4.4
bullet_green CORE-2777 Improvement: Add possiblity to remove SIP netfilter kernel modules

Core Network configuration
bullet_green CORE-2569 Bug: Support driverless 4G USB dongle
bullet_green CORE-2765 Bug: Add support for driverless 4G usb modems to products

UTM Certificate Management
bullet_green UTM-2013 Task: Sign certificates with Let’s Encrypt

No need to say, this new image includes a lot of improvements and bug fixes as well.
For more details, please see the changelog.

Happy installing!
Your Endian Team

Our first webinar about Endian Management Center: get a preview of features and offers

From now on you can manage all your Endian installations in a more powerful way with our new Management Center:
it is the Endian Connect complement, adding true centralized management capabilities to fully control your Endian ecosystem.

Just configure once, and deploy everywhere.


Using device profiles, administrators can create a template of a configuration which can then be assigned to any device to replicate (with a simple “copy and paste” function”). You can also see your network in Real-Time with the live map feature, which is especially valuable within the Endian Management Center by providing a visual representation of your Endian global deployment.

Don’t miss our launch webinar: we will provide a complete overview of all Endian Management Center’s features and some special offers related to the launch.

Sign up now for the webinar scheduled on Thursday, April 19, 2018
9:00 AM – 10:00 AM CDT | 16:00 PM- 17:00 PM CEST
For those who could not follow the webinar, their complete registration is available here

New Management Center is here: centrally manage all your appliances

Endian Management Center – Configure Once. Deploy Everywhere.

Centrally manage all your Endian appliances. Reduce administrator management time and effort and save valuable staff resources with centralized management made easy with Endian Management Center (EMC).

NEWS_infoEndian Management Center – Discover all the features

Endian Firewall Community 3.2.5 now available!

The Endian Team is proud to announce an updated image for the 3.2 release.

Check out the new release today by downloading the latest iso image. If you already have an installed community with at least a 3.2.0beta1 version you could just register and run the updates.

Get FREE updates for your Community!
The registration procedure is much easier now: follow the initial wizard and just with an e-mail address you can keep the system updated. Don’t forget to give us a feedback or report the bugs to JIRA.

Here’s a short list of changes compared to the latest version:

bullet_green Improvement UTM-1722 Add option for load custom TLS ciphers
bullet_green Improvement CORE-2143 Add CLI notification when a reboot is required
bullet_green Bug UTM-1813 OpenVPN job does not start after reboot
bullet_green Bug CORE-1416 Snort doesn’t work when HTTP proxy is ON
bullet_green Bug UTM-270 Squid terminates with an error if an entire domain and its subdomains are used in the same access policy

No need to say, this new image includes a lot of improvements and bug fixes as well.
For more details, please see the changelog.

Happy installing!
Your Endian Team

Are you up to date with GDPR?
Discover what it is and how we can help you

GDPR (General Data Protection Regulation): what it is

GDPR is a European Regulation that, starting from May the 25th 2018, will rule data privacy laws across Europe, to protect and empower all EU citizens’ data privacy and to reshape the way organizations across the region approach data privacy.

To whom it is adressed

GDPR is addressed to all Companies and Entities that collect European citizens personal data.

What if my company is based outside UE?

It is also addressed to societies, companies, firms and bodies of extra EU Countries that deal with EU citizens’ data privacy.

I have to deal with it even if my servers are located outside UE


What do we mean for “Personal Data”?

According to European Commission “personal data is meant as any information of an individual, related to his life either private, professional or public. It can be about everything: names, pictures, email addresses, bank details, website and social network’s activities, medical information or IP PC addresses”.

An overview of the main changes under GPDR and how they differ from the previous directive

  • The conditions for consent have been strengthened: consent must be clear and distinguishable and easily acces- sible form, using clear and plain language. It must be as easy to withdraw consent, as it is to give it
  • Wider Data Subject Rights, that expects:
    • Right to access data free of charge
    • Right to be Forgotten (also known as Data Erasure, the right to be forgotten entitles the data subject to have the data controller erase his/her personal data and cease further dissemination of the data
    • Right to edit data from the user side
  • Breach Notification will become mandatory and the owner of the data must be informed within 72 hours of first having become aware of the breach.
  • Impossibility to transfer data outside of EU Economic Territory without an explicit consent, unless specific conditions get applied.
  • Data Protection Officers. Each Public Entity, as well as Companies managing big size databases, must have a DPO (Data Protection Of- ficer) responsible of Data protection. It can be an internal or external figure.
  • Under GDPR, organizations in breach of GDPR can be fined up to €20 Million sanction, or 4% of annual global revenue.
  • Analysis of specific risks.Throughout the GDPR, organizations that control the processing of personal data are encouraged to implement protective measures corresponding to the level of risk
of their data processing activities. Although the GDPR is silent on how organizations should assess and quantify risk, certain trends emerge from the sections where risk does appear that will guide organizations in implementing a risk-based approach.
  • Proportionality of obligations, which are now more modu- lated to adapt to the size of the owner and to the danger- ousness of the treatment.

How can we help you? From A to Z.

The aim of the GDPR is to protect all EU citizens from privacy and data breaches in an increasingly data-driven world: it is clearly required to adopt the best available technologies to defend and secure its own network.

It is then needed to adopt solutions able to protect data from the beginning of the transmission, that set network administrators aware of potential risks and that promptly react to threats. Endian feature-suite is a complete solution including all the needed tools to allow you to prevent, protect and control.

Encrypted tunnel (VPN) to set your sensitive data transmission safe

Endian includes in all its products advanced systems of transmission data’s encryption, with different layers of simplified management, that al- lows to organize users and objects in an easy way, minimizing the risk of human error. In order to have a constant control of what happens in your network, as requested from GDPR, the first rule is to know who has access to different resources and be able to identify when he did it. Thanks to Endian Connect Platform, you can authorize and remove permissions in a granular but simple way, even in worldwide spread networks.

Real Time Network visualization

Do you know what is happening in your network right now? Are you aware of which applications your users are running? If not so, your Company productivity could be under risk and you would not be respecting new GDPR rules. Our solution allows you to have real time control on your network traffic, on an intuitive dashboard, and to store your data. The package also features a wide web reporting, email, security and much more that can be configured according selected parameters.

Controlling and real time reaction (IPS, Web and Mail Security)

Thanks to our Advanced Content Security Package, now included in all Endian products as a default feature, you can protect your co-workers from web and mail threats as virus, malware, phishing and spam, by exploiting cloud zero-day power with high performance engines. Intrusion Prevention System, deep-packet inspection and content altering, with more than 200 categories constantly updated. The best technologies available on market for an active protection.

Wi-Fi and Bring Your Own Device (BYOD)

Protection and monitoring have to be extended also to your guests and external co-operators, to respect the GDPR. Offer your visitors and guests to surf the web without compromising your network security: Endian UTM solutions provide guest-access management and allow you to create rules and apply filters for them, on a dedicated and separated physical network.

You can download our whitepaper here.

The NEW Endian UTM Mercury 50: Better, Faster Hardware. Same Low Price

Endian is thrilled to announce a new, upgraded hardware UTM Mercury 50 platform to our customers! This platform provides significantly higher performance marks in all categories while keeping the same low price. The new Mercury 50 still comes with the same comprehensive suite of Endian UTM features including firewall, web and email filtering, VPN, Hotspot and so much more.

This mid-size appliance is perfect for small- and medium-size businesses especially those looking to centrally connect their remote branch office locations. It’s also fully compatible and a great solution to use with the Endian Connect Platform for customers and projects that require more powerful and expanded remote access capabilities. Of course you also get basic centralized remote access via Endian Network included with any active maintenance.

The new UTM Mercury 50 is the most powerful and affordable hardware platform you can buy to connect and secure small- and medium-size (SMB) business networks.

NEWS_infoLearn More

Endian Connect Platform: Now with Big Data Monitoring & Analysis

Predictive maintenance is all about being more efficient, cost savings and increased customer satisfaction.  That’s why it’s a perfect addition to the Endian Connect Platform.  Now your business can not only Connect, Secure and Simplify their remote connectivity but also add Analyze and Monitor field data!  Build your own custom dashboards to monitor virtually any and all data points coming from any and all field devices.  Come check us out and see the difference our Connect Platform can make for your business.

Endian presents these new features for the first time at the
sps ipc drives in Nuremberg (28.-30.11.) Hall 6 Booth 140K
Come and visit us – get your free ticket now:
Registration number: 1712345858


Endian wins Digital Transformation Award

Endian wins the Digital Transformation Award 2017 for its innovative project in the digitization of medical technology at Werfen, a world leader in the development of in vitro diagnostics. CRN awards this prize to vendors, that have successfully paved their customers way to the digital future.

A specialist jury around the CRN editor-in-chief Martin Fryba selected five winners among the numerous submissions. In terms of innovation, customer benefit and effectiveness, the winning projects had to stand out clearly from their competitors. In addition to the company size of the customer, the complexity of the project and the level of investment, the decisive question was, whether the project could be realized with other customers as well.

The award ceremony was the highlight of the Digital Transformation Convention from October 24th to October 25th in Munich, where companies are informed about the latest developments in the field of digitization.

The project at Werfen proves that digitization makes companies fit for the future. Thanks to the solution form Endian, Werfen benefits from increased efficiency, as well as improved service quality and customer satisfaction.

News-download_iconPlease find all information about the Werfen project here:

WPA2 Vulnerability (KRACK): please update your Endian WiFi appliance

A serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks, has been discovered. An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs). Concretely, attackers can use this novel attack technique to read information that was previously assumed to be safely encrypted. This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on. The attack works against all modern protected Wi-Fi networks. Depending on the network configuration, it is also possible to inject and manipulate data. For example, an attacker might be able to inject ransomware or other malware into websites ( for more details).

Which Endian products are affected?
UTM Mini WiFi Series

How to fix your Endian?
Just update your appliance to the latest release. Using Endian Network you can easily update all your customer appliances in a single click, providing security fixes and updates to all your managed networks.

RECOMMENDED: patch your WiFi clients (smartphone, notebook, etc) with the latest update from vendors, in order to completely remove your exposure to this attack ( )

CVE about this vulnerability