Overview
BluePex Firewall UTM on AWS is a unified security appliance delivered as an Amazon Machine Image (AMI), designed to protect cloud and hybrid environments with advanced network security and centralized management. Deployed directly within the customer VPC, it provides full traffic inspection and policy enforcement for applications, users, and workloads running on AWS. The solution integrates stateful firewall, IDS/IPS, malware protection, application control, web filtering, and GeoIP-based traffic blocking in a single platform. Security policies can be configured by time, object, and context, enabling consistent enforcement aligned with organizational requirements. BluePex Firewall UTM supports secure connectivity through IPsec, L2TP, and OpenVPN, enabling site-to-site and multi-cloud VPN architectures without additional licensing costs. Detailed logs, access reports, and VPN usage visibility are included to support operational monitoring and audits. Centralized management is provided through Cyber Domo, a cloud-based management platform that offers unified visibility, operational dashboards, alerts, and reporting. Cyber Domo enables administrators to manage standalone deployments, branches, and distributed environments from a single console. The solution includes built-in compliance and reporting capabilities, with standardized and customizable reports, audit-ready logs, and business intelligence dashboards to support governance, risk, and compliance initiatives. Designed for high availability and operational resilience, BluePex Firewall UTM supports HA configurations, automated configuration backups, disaster recovery tooling, and link failover mechanisms.
Highlights
- 1. Unified Firewall UTM delivered as an AMI for secure deployment inside AWS VPCs. 2. Stateful firewall with IDS/IPS, malware protection, application control, and web filtering. 3. Full traffic inspection with policy enforcement at network and application layers 4. Secure VPN connectivity with IPsec, L2TP, and OpenVPN included at no additional cost.
- 5. Centralized management, monitoring, and reporting through Cyber Domo platform. 6. Built-in compliance and audit-ready reports with detailed logs and dashboards. 7. High availability support, automated backups, and disaster recovery capabilities.
- 8. OPEX-based pricing with hourly billing through AWS Marketplace Simplified deployment without additional hardware or separate VPN licensing. 9. Designed for cloud, hybrid, and multi-site environments.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Financing for AWS Marketplace purchases
Pricing
Vendor refund policy
Refunds are available for defective products, non-delivery, or incorrect purchases made within [specified timeframe]. Requests must be submitted via email or our support portal, including transaction details and reasons. Refunds are processed within [10 business days] and may be subject to administrative or usage fees. Custom orders and activated licenses are non-refundable. Policy updates may occur; customers will be notified. For questions, contact our support team.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
We develop innovative IT and Cybersecurity solutions for managing your company's entire technological plant in a simple and easy way, in a single panel and from a single supplier.
Additional details
Usage instructions
- In the AWS Management Console, navigate to the EC2 Dashboard.
- Under "Instances," select the instance you wish to connect to.
- Click on "Actions," then "Instance Settings," and choose "Attach/Replace IAM Role" if applicable.
- Navigate to the "Network & Security" tab and locate the "Key Pair" section.
- Click on "Edit" or "Change Key Pair" to select the new key pair you wish to use.
- If you have not yet created a key pair, click on "Create Key Pair" and follow the prompts to generate a new key pair. Download the private key file (.pem) and save it securely.
- After selecting the new key pair, ensure it is associated with the instance.
- Use an SSH client to connect to your instance using the new key pair. For example, if you are using a terminal, you can use the following command: ssh -i /path/to/your-key.pem ec2-user@your-instance-public-dns.
Support
Vendor support
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.