Secure your Virtual Infrastructure

Connect and protect your virtual networks and infrastructure. Support for all the leading hypervisor-based platforms including VMware, Xen/XenServer, KVM and Hyper-V.

Protect the Virtual Network

Most virtual networks are not much different from physical networks so the same networking and security principles should be applied. Whether your running a virtualized platform in the data center or at remote offices, concepts like network separation are critical to safeguard various virtual resources from each other, protect and separate the virtual data and management networks, prevent the spread of malware, and provide containment against hackers and other threats.


Secure External Connectivity

All virtual networks require some form of physical connectivity which means you may want to securely connect virtual resources to the outside world. Endian provides this with both IPSec or SSL VPN (OpenVPN) and multiple connectivity options including network-to-network and individual remote access (roadwarrior). Whether you are using virtual platforms to connect remote offices, link up data centers, or just for disaster recovery, Endian has the solution for you.


Hosted / Cloud Services

If you are providing some form of a hosted or cloud public service then you already recognize how important it is to ensure to your existing and potential customers that you implement maximum security processes and technology. Our virtual solution can enhance any hosted service from simple web and email services to more complex VoIP and VPN configurations. The Virtual Appliance makes securing your virtual platform simple, scalable, and best of all cost-effective.


Simple and Effective

By providing simple and effective network security solutions, Endian helps businesses leverage new virtual and cloud technologies to:

  • Secure the entire virtual infrastructure (internally and externally)
  • Seamlessly integrate with current virtual platform investments and their management tools
  • Save time and effort (i.e. money) with Endian centralized management and support tools
  • Securely connect all of the virtual or hosted infrastructure to the main office using VPN
  • Monitor and prevent access to and from the virtual systems to the outside world
  • Safeguard all inter-VM, internal, and external network connectivity

All of these objectives and more can be achieved using the Virtual Appliance.

Endian Advantages

The Virtual Appliance offers the most intuitive and universally supported solution available by including things like:

  • Support for four major virtual platforms including VMware, Xen, Hyper-V and KVM
  • Unified, intuitive user interface across all platforms - hardware, software, and virtual
  • Extremely efficient and scalable resource requirements
  • Native support included for available virtual infrastructure toolsets

In addition, you can utilize all of the great features that come with all flavors of the Endian UTM family including centralized management and monitoring via Endian Network, the simplest web interface available, best of breed open-source software, top-notch Endian support and much more.

Requirements and Compatibility

EndianOS UTM must be installed onto a dedicated virtual machine with at least 2 vCPU.
The table below provides some recommended hardware specifications but remember that each network is different.

System Requirements10 - 50 devices100 - 250 devices500 - 2,500 devices
Architecturex86_64 architecturex86_64 architecturex86_64 architecture
Cores2 cores4 or more cores8 or more cores
Hard Drive32GB256GB1TB

EndianOS: Engine for a Secure Digital Transformation

Unlock the potential of your digital journey with EndianOS, the robust operating system designed to meet the challenges of IT and OT convergence in the digital age.


EndianOS UTM Highlights

At the core of the Endian ecosystem is EndianOS which powers the entire Secure Digital Platform. A security focused operating system built to provide the complete networking, security and connectivity stack in an intuitive and easy to operate solution.

Zero Trust Architecture

Enforce fine-grained access and authorization policies to reduce attack surface. Monitor and audit access records for compliance efforts.


Define network zones and firewall policies to protect critical IT assets and interconnect different segments via secure pathways (NAT & VPN).

Threat Management

Detect and stop advanced threats and attacks from infiltrating your business network using our multi-faceted security toolset.

Edge Computing

Manage edge applications to simplify software distribution and enable third party software for analytics, monitoring, automation and more.

Work from Anywhere

Securely support all work environments including Work from Anywhere with powerful, easy to use VPN and Bring Your Own Device (BYOD) capabilities.

Secure Web and Mail Communication

Protect your employees and keep your business network safe from threats like phishing, ransomware and other malware. Enforce compliance with policies that maximize productivity and reduce downtime.

Network Visibility and Monitoring

Endian Network Awareness provides visibility to discover and protect against threats and identify network bottlenecks or inappropriate activity.