Unified Threat Management Guide for Managers


This article can also be found in the Premium Editorial Download "Information Security magazine: Is your data safe from next-generation attackers?."

Download it now to read this article plus other related content.

It's a firewall, it's an IPS, it's antivirus, it's antispam... but is it right for you?

Requires Free Membership to View

More information from our sister site SearchSecurity.com

Go to Intrusion Defense School to learn more about Unified Threat Management and its role in a holistic intrusion defense strategy. CISSPs and SSCPs who attend the School webcasts are eligible to earn CPE credits from (ISC)2.

Visit our resource center for tips and expert advice on Unified Threat Management.

Special Feature
Be Prepared
By Joel Snyder

Case Study
UTM Boosts Hospital's Immunity
By Bill Brenner

UTM Buyer's Guide
Compiled by Neil Roiter

What Is 'Best-of-Breed,' Anyway?
By Joel Snyder

This was first published in June 2006

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: