Call me an old fuddy duddy, but I'm not a big fan of unified threat management (UTM) technology. This approach builds multiple security services into a single device, promising ease of management and more efficient updating, as well as reduced cost. However, I see a few major drawbacks to the UTM approach:
- Vendor lock-in -- UTM commits an enterprise to using a single vendor for its entire security infrastructure. The best-of-breed approach, however, allows security pros the freedom to choose the best security tools they can find, rather than putting all of their security eggs in a single vendor's basket.
- Questionable time-savings -- I'm not so sure that a UTM increases operational efficiencies. After all, managing an IPS, firewall and Web filter are really different tasks. While it might be possible to use a single management console to do all these things with a UTM product, you'll still be clicking around each area. How much time does it really take to open three different interfaces instead?
- Lack of redundancy -- I definitely don't like the idea of having multiple security services running on the same piece of hardware. In addition to the potential loss of defense in depth if the device is compromised, it puts the company at risk of losing all its security services in the event of a platform failure.
So, now that I've painted a bleak picture for UTM, let me temper my advice. There is definitely a place for UTM in the market, especially for midsize businesses looking for a way to add new security services to their infrastructure at the lowest possible cost. My point is to simply be wary of the potential drawbacks as well as advantages during the UTM technology evaluation process, or for that matter, when evaluating any network security technology.
For more information:
- Check out this screencast on how to configure a UTM device.
- Five considerations for securing a midmarket company: Read more.
Dig deeper on UTM Appliances and Strategies
Related Q&A from Mike Chapple, Enterprise Compliance
The HHS security risk assessment tool is designed to help healthcare providers meet the HIPAA security requirement. Expert Mike Chapple explains how ...continue reading
PCI DSS requirement 6.6 demands application security compliance through one of two options: an application firewall or a code review. Expert Mike ...continue reading
Are HIPAA-compliant hosting services a better option for compliance than a secure storage API? Expert Mike Chapple analyzes.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.