Premium Content

Access "Product review: Unified threat management (UTM) devices"

Published: 22 Oct 2012

Is your business ready To roll network security into a single platform? We evaluate six leading UTM appliances to help you push the right buttons. Unified Threat Management is a growing, competitive field, with more than a dozen vendors. The idea is to consolidate your security appliances into a single box and manage an integrated protection profile for your corporate network. While especially appealing for companies with several branch offices without any resident IT or security staff, the implementation isn't perfect for a corporate-wide deployment, primarily because of limits on how you are allowed to administer the component security applications. We asked vendors to deliver a product that could act as a firewall and virtual private network gateway, and protect our test network against attack with a minimum of four defense mechanisms--antivirus, Web content filtering, intrusion prevention and antispam. We reviewed six UTM appliances in a head-to-head evaluation: Astaro Internet Security's Astaro Security Gateway 320; Check Point Software's UTM-1 2050; ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features
    • Product review: Unified threat management (UTM) devices

      Unified threat management devices consolidate several network security functions into one product. This article evalutes six UTM appliances; each had to act as a firewall and virtual private network and provide antivirus, Web content filtering, intrusion prevention and antispam protection.

    • SIMs maturing and suitable for mid-market

      Security information management systems (SIMs) tools have expanded with more capabilities such as active threat response. The broadening of the technology will provide security managers with a sharper view of their overall security posture.

    • Encryption key management blunders can render deployments useless

      Encryption sounds like an ideal way to protect data but key management, including accountability, training, and enforcement of password complexity, are challenging.

    • Product review: Identity Engines' Ignition Server

      Identity Engines' Ignition Server manages access controls across disparate directory services platforms (Active Directory, LDAP, eDirectory) by consolidating them into a single user store.

More Premium Content Accessible For Free