Cisco Systems ASA 5500 Series Adaptive Security Appliance
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Networking behemoth Cisco got the nod for gold in the UTM category. Readers were pleased with the breadth off functionality offered on their ASA 5500 devices. Users of the UTM were also very satisfied with the vendor service and support they received as well as the form factor of the device.
IBM ISS Proventia Network Multi-Function Security (MFS)
IBM Internet Security Systems
The ISS Proventia, now owned by IBM, offered a wide range of security functions in one box and the form factor was very attractive to its users. What's more, users felt that each individual feature was as robust as standalone products and offered adequate security. They were also pleased with the choice of additional add-ons available to them.
Check Point Software Technologies UTM-1
Check Point Software Technologies
Check Point users were pleased with the breadth of security functionality for their UTM offerings. They scored the higher than Cisco and IBM in the category of ease of installation, configuration and the administration of the UTM devices. Users felt they are getting their money's worth, an important consideration in today's difficult economy.
"Selecting a UTM solution is like a box of chocolates… you never know what you are going to get. Baseline UTM functionality includes firewall, AV, IPS/IDS and VPNs. New UTM functionality is turning to capabilities to help [users] address many "channels" including email, web, instant messaging, peer-to-peer file sharing and voice over IP, for the potential loss or exposure of sensitive data." -- Derek E. Brink, vice president and research fellow, IT security, Aberdeen Group
2009 READERS' CHOICE AWARDS
Introduction and Methodology
Best Antimalware Products
Best Application Security Products
Best Authentication Products
Best Data Loss Prevention Products
Best Email Security Products
Best Identity and Access Management Products
Best Intrusion Detection and Prevention Products
Best Mobile Data Security Products
Best Network Access Control Products
Best Network Firewalls
Best Risk and Policy Management Products
Best Secure Remote Access Products
Best Security Information and Event Management Products
Best Unified Threat Management Products
Best Vulnerability Management Products
Best Web Security Gateway Products
Best Wireless Security Products