Turn any PC into a UTM Appliance

The software appliance is ideal for those who are looking to leverage existing hardware (x86_64) for their networking and security needs.

The Endian UTM Software instantly converts any existing hardware (x86_64) into an Endian UTM appliance. Unleash the power of Endian UTM using your preferred hardware to provide comprehensive network security for your business.

The Endian UTM family is built for business with a comprehensive feature set that provides a suite of advanced network security. Protect your network and users from advanced threats (malware, ransomware, phishing, etc). Allow users to work from anywhere securely with remote user access. Visualize and monitor everything like never before.


  • Leverage your own hardware (x86_64)
  • Efficient resource requirements
  • Flexibility to change with your business needs
  • Supports wide range of hardware and components
  • No operating system required (included)
  • High availability (supported)

Requirements and Compatibility

EndianOS UTM must be installed onto a dedicated machine with at least 2 NICs.
The table below provides some recommended hardware specifications but remember that each network is different.

System Requirements10 - 50 devices100 - 250 devices500 - 2,500 devices
Architecturex86_64 architecturex86_64 architecturex86_64 architecture
Cores2 cores4 or more cores8 or more cores
Hard Drive32GB256GB1TB
  • For software Raid1 (mirroring) two disks of the same type are required
  • Most common Network Interface Cards are supported including Gigabit and fiber NICs
  • For users looking for a Hardware solution our portfolio includes the Endian Mini, Endian Mercury and Endian Macro

EndianOS: Engine for a Secure Digital Transformation

Unlock the potential of your digital journey with EndianOS, the robust operating system designed to meet the challenges of IT and OT convergence in the digital age.


EndianOS UTM Highlights

At the core of the Endian ecosystem is EndianOS which powers the entire Secure Digital Platform. A security focused operating system built to provide the complete networking, security and connectivity stack in an intuitive and easy to operate solution.

Zero Trust Architecture

Enforce fine-grained access and authorization policies to reduce attack surface. Monitor and audit access records for compliance efforts.


Define network zones and firewall policies to protect critical IT assets and interconnect different segments via secure pathways (NAT & VPN).

Threat Management

Detect and stop advanced threats and attacks from infiltrating your business network using our multi-faceted security toolset.

Edge Computing

Manage edge applications to simplify software distribution and enable third party software for analytics, monitoring, automation and more.

Work from Anywhere

Securely support all work environments including Work from Anywhere with powerful, easy to use VPN and Bring Your Own Device (BYOD) capabilities.

Secure Web and Mail Communication

Protect your employees and keep your business network safe from threats like phishing, ransomware and other malware. Enforce compliance with policies that maximize productivity and reduce downtime.

Network Visibility and Monitoring

Endian Network Awareness provides visibility to discover and protect against threats and identify network bottlenecks or inappropriate activity.