This article can also be found in the Premium Editorial Download "Information Security magazine: Is your data safe from next-generation attackers?."
Download it now to read this article plus other related content.
It's a firewall, it's an IPS, it's antivirus, it's antispam... but is it right for you?
Requires Free Membership to View
|
More information from our sister site SearchSecurity.com
Go to Intrusion Defense School to learn more about Unified Threat Management and its role in a holistic intrusion defense strategy. CISSPs and SSCPs who attend the School webcasts are eligible to earn CPE credits from (ISC)2. Visit our resource center for tips and expert advice on Unified Threat Management. |
||||||
Special Feature
Be Prepared
By Joel Snyder
Case Study
UTM Boosts Hospital's Immunity
By Bill Brenner
UTM Buyer's Guide
Compiled by Neil Roiter
Opinion
What Is 'Best-of-Breed,' Anyway?
By Joel Snyder
This was first published in June 2006
Security Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation