Enterprise firewall protection: Where it stands, where it's headed
A comprehensive collection of articles, videos and more, hand-picked by our editors
One of our vendors recently released an upgraded firewall that includes intrusion prevention system (IPS) and integrated...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
application control, among other functions. Do you think adding multiple types of technical capabilities to a single appliance increases the likelihood of a failure of some kind, and if so, does it require rethinking redundancy and failover requirements for these "next-generation" firewall appliances?
Ask the expert
Got a vexing problem for Mike Chapple or any of our other experts? Ask your enterprise-specific questions today! (All questions are anonymous.)
The devices you’re referring to are commonly known as unified threat management (UTM) devices. At their most basic level, UTM devices are firewalls, but they’re equipped with other security features that may include intrusion detection and prevention capability, content filtering, virtual private networking (VPN), antivirus or antimalware capabilities, data loss prevention (DLP) and vulnerability management.
Personally, I wouldn’t worry about increasing the possibility of a failure. A firewall is such a critical component of your infrastructure that fault tolerance shouldn’t be considered optional. Your network should be designed to be resilient enough to handle the failure of a single firewall, be it a dedicated firewall or a UTM.
More on UTMsInformation Security magazine: Unified threat management devices for the enterprise
UTMs aren’t just for SMBs anymore. Read Joel Snyder's four requirements for enterprise-grade UTM.
What most concerns with a UTM device is the amount of processing power you can pack into a single appliance. If you’re in a large enterprise, you’ll probably find you’re better off with special purpose devices fulfilling each of the security functions covered by a UTM. Conversely, UTMs are a great benefit for small enterprises with low network throughput, especially in cases where the organization would not be able to afford the full suite of services offered by the UTM without the bundled discount.
For more on UTM’s role, see my tip on the topic: UTM features: Is a UTM right for your layered defense?
Related Q&A from Mike Chapple
The HHS OCR ruled that healthcare ransomware attacks are HIPAA violations, so these covered entities need to react according to the HHS's guidance. ...continue reading
HIPAA regulations incorporate NIST guidelines and standards, so do healthcare organizations need to be compliant with both? Expert Mike Chapple ...continue reading
Now that NIST has deprecated the use of SMS 2FA, should nongovernment organizations follow suit? Expert Mike Chapple discusses the risks of SMS-based...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.