Best Unified Threat Management Products 2010

Check Point UTM-1, Safe@Office
Check Point Software Technologies

Readers awarded the gold medal to Check Point Software Technologies' UTM-1 security appliances and Safe@Office UTM appliances.

    Requires Free Membership to View

UTM-1 includes integrated centralized management, security updates, and hardware support. Safe@Office appliances provide small businesses with comprehensive protection, including firewall, IPS and anti-malware. Readers gave the products high scores across the board, but particularly liked their breadth of security functions/features, and depth of security provided by individual functions. The appliances were also rated highly for choice of optional security applications.

SonicWALL NSA Series, E-Class Network Security Appliance Series

The SonicWALL Network Security Appliance (NSA) Series appliances and E-Class Network Security Appliance Series won the silver, earning especially high marks for form factor effectiveness, but also strong ratings for breadth of security functions/features and ease of installation, configuration and administration. Readers also felt strongly that they're getting their money's worth with the products. The SonicWALL NSA Series, which replaced the PRO Series, combines several functions, including a deep-packet inspection firewall, intrusion prevention and Web content filtering. The E-Class series is designed to provide integrated gateway security without degrading network performance.

Cisco ASA 5500 Series Adaptive Security Appliance
Cisco Systems

The Cisco ASA 5500 Series Adaptive Security Appliance picked up the bronze medal, winning readers over with its form factor effectiveness and breadth of security functions and features. Readers also rated the product highly for its return on investment. The appliance series provides advanced intrusion prevention services, an adaptable architecture for speedy deployment, and secure remote access and unified communications. The series features a range of models to meet the needs of small businesses and branch offices to data centers.


  Introduction and Methodology
  Best Antimalware Products
Readers vote on the best business-grade desktop and server antivirus and antispyware products.
  Best Authentication Products
Readers vote on the best digital identity verification products, services, and management systems, including PKI, hardware and software tokens, smart cards.
  Best Data Loss Prevention Products
Readers vote on the best network, client and combined data loss prevention software and appliances for enterprise and midmarket deployments.
  Best Identity and Access Management Products
Readers vote on the best identity and access management products, including user identity access privilege and authorization management, single sign-on, user identity provisioning.
  Best Intrusion Detection and Prevention Products
Readers vote on the best intrusion prevention/detection products, including network-based intrusion detection and prevention appliances, using signature-, behavior-, anomaly- and rate-based detection.
  Best Messaging Security Products
Readers vote on the best antispam, antiphishing, email antivirus and antimalware filtering, software and appliance products, as well as hosted "in-the-cloud" email security services.
  Best Mobile Data Security Products
Readers vote on the best mobile data security products, including hardware- and software-based file and full disk laptop encryption and removable storage device protection.
  Best Network Access Control Products
Readers vote for the best NAC products, including appliance, software and infrastructure user and device network access policy creation, compliance, enforcement and remediation.
  Best Network Firewalls
Readers vote on the best network firewalls, including enterprise-caliber network firewall appliances and software, and stateful packet filtering firewalls with advanced application/protocol layer filtering.
  Best Secure Remote Access Products
Readers vote on the best remote access products, including IPsec VPN, SSL VPN, and combined systems and products, as well as other remote access products and services.
  Best Security Information and Event Management Products
Security information and event management and log management software, appliances and managed services for SMB and enterprise security monitoring, compliance and reporting.
  Best Unified Threat Management Products
Readers voted on the best unified threat management products, including UTM appliances that feature firewall, VPN, gateway antivirusm URL Web filtering and antispam.
  Best Vulnerability Management Products
Readers vote on the best vulnerability management products, including network vulnerability assessment scanners, vulnerability risk management, reporting, remediation and compliance, patch management and vulnerability management lifecycle products.
  Best Web Security Gateway Products
Readers vote on the best Web security gateway products, including software and hardware, hosted Web services for inbound and outbound content filtering for malware activity detection and prevention.

This was first published in September 2010

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: