Companies are increasingly finding attractive the idea of unified threat management (UTM) systems, and vendors are responding with a range of products. Originally, smaller companies were the logical adopters of UTM technology, but now even giant enterprises see ways that large-scale UTM makes sense. If you think UTM might be in your company's future, there are several factors to consider, including how the product incorporates various security elements, the scale of its deployment and whether it should be hardware or a virtual product.
This IT Decision Center outlines critical questions you must ask when considering a UTM product and provides insight on what UTM features will best meet your requirements. It also challenges UTM vendors to clarify what their particular products offer.
Chapters Available For Free Access
Learn how unified threat management (UTM) systems can help you achieve a layered security defense.
To properly evaluate unified threat management (UTM) products, you must understand what each vendor offers and how well it fits with your ...
Learn how to evaluate your potential vendor's UTM product and its ability to meet your specific business requirements.
Tips and Tutorials
- Introduction to Information Security: A Strategic-Based Approach
- Snort OpenAppID introduction: Open source application control
- Unified Communications Forensics: Anatomy of Common UC Attacks
- Continuous security monitoring: What enterprises can learn from CDM
- Best of intrusion detection and prevention 2013
- Cisco security strategy update: Cisco adds Sourcefire AMP to gateways
- Marty Roesch pushes collective analysis, underscores cyberthreat intelligence
- Snort creator remains guiding force behind network detection system
- Researchers uncover Cisco firewall vulnerabilities, McAfee console flaws
- Network forensics tools increasingly aid security response teams
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...