Access "Unified threat management products gaining midmarket, enterprise foothold"
This article is part of the July/August 2009 issue of Why privileged account management is critical to today's data security
If you are responsible for security at a small- to mid-sized business, and your current firewalls aren't unified threat management (UTM) appliances, then your next ones will be. With the possible exception of a few low-end SOHO firewall products, every vendor offers a range of firewall/VPN appliances with options to add gateway antivirus, intrusion prevention, antispam, URL filtering and other security functions on a single box. "The UTM space has essentially replaced the firewall space; at the low end, there are no firewalls that are not UTM," says Joel Snyder, senior partner at consultancy Opus One. "If you talk about what people used to buy for a small business in the $150-to-$1,000 range, I don't think you can find one that doesn't have UTM capabilities." It can get confusing. Businesses are faced with complex choices: Extra security comes at a price, both in ongoing subscriptions and performance, so what do you really need and what are you prepared to pay for? Most vendors offer an extensive line of appliances to accommodate your traffic requirements ... Access >>>
Premium Content for Free.
ISP shutdown latest cat-and-mouse game with hackers
While the 3FN.Net shutdown had limited impact on cybercriminals, it signaled that the private sector and the government are serious about illegal activity.
DNSSEC deployments gain momentum since Kaminsky DNS bug
DNSSEC brings PKI to the Domain Name System and prevents dangerous cache poisoning attacks. Implementation difficulties and political battles, however, keep it from going mainstream.
- ISP shutdown latest cat-and-mouse game with hackers
Privileged account management critical to data security
Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts.
Unified threat management products gaining midmarket, enterprise foothold
Unified threat management (UTM) appliances offer consolidated security services in a single, manageable firewall/VPN appliance. But purchase and use only the security options you need. Otherwise you will pay too much for the appliance and for tools that won't make your business more secure
- Privileged account management critical to data security
Editor's Desk: Google security needs HTTPS by default
Security's leading thinkers ask Google to turn on HTTPS by default for Gmail, Docs and Calendar.
Align your data protection efforts with GRC
Data protection and compliance teams battle for resources but need each other to succeed.
- Editor's Desk: Google security needs HTTPS by default
More Premium Content Accessible For Free
For many security teams, "continuous monitoring" is a vague concept associated with FISMA compliance. A continuous monitoring program can be simple ...
The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features ...
Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...