Call me an old fuddy duddy, but I'm not a big fan of unified threat management (UTM) technology. This approach...
builds multiple security services into a single device, promising ease of management and more efficient updating, as well as reduced cost. However, I see a few major drawbacks to the UTM approach:
- Vendor lock-in -- UTM commits an enterprise to using a single vendor for its entire security infrastructure. The best-of-breed approach, however, allows security pros the freedom to choose the best security tools they can find, rather than putting all of their security eggs in a single vendor's basket.
- Questionable time-savings -- I'm not so sure that a UTM increases operational efficiencies. After all, managing an IPS, firewall and Web filter are really different tasks. While it might be possible to use a single management console to do all these things with a UTM product, you'll still be clicking around each area. How much time does it really take to open three different interfaces instead?
- Lack of redundancy -- I definitely don't like the idea of having multiple security services running on the same piece of hardware. In addition to the potential loss of defense in depth if the device is compromised, it puts the company at risk of losing all its security services in the event of a platform failure.
So, now that I've painted a bleak picture for UTM, let me temper my advice. There is definitely a place for UTM in the market, especially for midsize businesses looking for a way to add new security services to their infrastructure at the lowest possible cost. My point is to simply be wary of the potential drawbacks as well as advantages during the UTM technology evaluation process, or for that matter, when evaluating any network security technology.
For more information:
- Check out this screencast on how to configure a UTM device.
- Five considerations for securing a midmarket company: Read more.
Dig Deeper on UTM Appliances and Strategies
Related Q&A from Mike Chapple
Vulnerability scanning tools are necessary to be fully compliant with PCI DSS, but the tools need to come from a PCI DSS Approved Scanning Vendor. ...continue reading
Healthcare clearinghouses like Mass HIway are a new trend in health IT, but what are the security implications? Expert Mike Chapple explains what you...continue reading
The FFIEC Cybersecurity Assessment Tool has faced harsh criticism since its 2015 release. Expert Mike Chapple reviews the tool and how it can be ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.