We're in talks with vendors about purchasing a UTM device, and are having trouble winnowing down the field. We'd...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
like to do a trial run of a few of the products with our systems, but to do so would be time-consuming, and it's likely that features of the products would've changed by the time we've tested them all. How many products would you recommend actually testing on our networks, and what's the best way to decide which ones to test?
One thing to keep in mind when deciding among unififed threat management (UTM) vendors is your existing network platform. For example, if the enterprise is already running Juniper products, it might be easier to first consider Juniper's UTM platform. This can not only make integration and migration a bit easier, but there may also be cost benefits to expanding a deal with an existing vendor.
But that does not mean the organization should immediately rule out other leaders in this space. Given that UTM appliances tend to be deployed across critical connectivity paths on a network, make sure any UTM product implemented has the ability to protect the network adequately.
A good approach would be to narrow down the field to three or four established network/security appliance vendors whose products meet all the key requirements and rank the vendors based on initial product overviews. The actual bakeoffs (in the interest of time) might be best limited to the top two of the four vendors initially selected. For example, a good initial test case could involve a bake-off between a couple of the following vendors: Check Point (VPN-1 platform), Juniper (SSG platform), Cisco (ASA platform) and SonicWall (NSA platform).
Related Q&A from Anand Sastry
While encrypting production servers may seem like a good security move, according to Anand Sastry, doing so may not be worth the resources it uses.continue reading
Transferring files from a DMZ to an internal FTP server can be risky. In this expert response, Anand Sastry explains how to use SFTP automation to ...continue reading
When setting up a site-to-site VPN, where should the VPN endpoint be in the DMZ? Learn more in this expert response.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.