UniFi CyberSecure
UniFi has a comprehensive suite of cybersecurity tools built around zero-trust networking (ZTNA), empowering you to take full control of your network security. With UniFi, you can isolate sensitive systems, minimize attack surfaces, monitor for threats in real time, and enforce granular, policy-driven access across every layer of your network.
For a full overview of UniFi’s Traffic and Policy Management capabilities, see here.
Key Cybersecurity Features
Explore the powerful features of UniFi CyberSecure, each dedicated to safeguarding your network.
- Network & Client Isolation: Prevent lateral movement by isolating VLANs, wireless networks, and individual clients—ensuring devices only communicate where explicitly allowed.
- Organizations & IdP Integration: Centralize administration and streamline user management with seamless onboarding, offboarding, and secure authentication via identity providers like Google Workspace and Microsoft Entra ID, including support for MFA.
- Intrusion Detection and Prevention (IDS/IPS): Monitor and analyze network traffic in real time to detect and block suspicious activity, helping prevent unauthorized access, exploits, and other threats.
- Content & Domain Filtering: Block explicit, malicious, or unwanted domains across your networks with pre-packaged filters and custom rules.
- CyberSecure Enhanced By Proofpoint and Cloudflare: Leverage real-time threat intelligence and domain-filtering services to provide an additional layer of network security.
- Application Filtering: Quickly block or allow specific applications or entire categories of applications.
- SSL Inspection: Decrypt and inspect traffic to detect hidden threats and obtain a more comprehensive security posture.
- Secure VPN and SD-WAN: Enforce secure connectivity between sites and remote users with intelligent routing and encryption, optimized for performance and reliability.
- Traffic Logs: View detailed flow logs of all network activity to analyze usage patterns, monitor security events, and troubleshoot issues.
- System Activity Logs: Track administrative actions, system events, and configuration changes across your UniFi environment for audit and compliance visibility.
- Honeypot: Deploy decoy services on your network to detect and log malicious scanning or intrusion attempts before real systems are compromised.
Network (VLAN) Creation
Networks (VLANs) provide the foundational segmentation required for many UniFi features, including security, policy enforcement, and traffic management. To learn more about creating, managing, and assigning clients to particular VLANs, see here.