UTM vs. NGFW: Comparing features, use cases
  • Getty Images/iStockphoto

    UTM vs. NGFW: Comparing features, use cases

    UTM vs. NGFW: Comparing features, use cases

    What's the difference between unified threat management (UTM) products and next-generation firewalls (NGFW)? Brad Casey discusses.

  • MORE HIGHLIGHTS

    Pay-as-you-go UTM: Does it make sense?

    Should enterprises deploy cloud-based UTM when it's billed by the hour? Brad Casey discusses the pros and cons of the offering.

  • digital certificate

    A digital certificate is an electronic "passport" that allows a person, computer or organization to exchange information securely over the Internet...

  • Best of unified threat management 2013

    Readers rate the top unified threat management products in 2013: integrated security systems with firewall, content filtering and antivirus software.

UTM Appliances and Strategies

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • UTM: Decision time

    Learn how to evaluate your potential vendor's UTM product and its ability to meet your specific business requirements. 

  • UTM: RFP technology decisions

    To properly evaluate unified threat management (UTM) products, you must understand what each vendor offers and how well it fits with your organization. 

  • UTM: From business problem to technical solution

    Learn how unified threat management (UTM) systems can help you achieve a layered security defense. 

  • Unified threat management: What UTM product fits your organization?

    Companies are increasingly finding attractive the idea of unified threat management (UTM) systems, and vendors are responding with a range of products. Originally, smaller companies were the logical adopters of UTM technology, but now even giant ente... 

  • Weight lifter: Appliances that lighten your security load

    "All-in-one" security appliances offering similar features can be surprisingly different under the hood. To better understand the capabilities of these security gateways, Information Security compared six appliances designed for midsized compa... 

  • digital certificate

    A digital certificate is an electronic "passport" that allows a person, computer or organization to exchange information securely over the Internet using the public key infrastructure (PKI). A digital certificate may also be referred to as a public k... 

  • distributed denial-of-service attack (DDoS)

    On the Internet, a distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. 

  • denial of service (DoS)

    A denial of service (DoS) attack is an incident in which a user or organization is deprived of the services of a resource they would normally expect to have. Typically, the loss of service is the inability of a particular network service, such as e-m... 

  • integrated threat management

    Integrated threat management is a comprehensive approach to network security that addresses multiple types of malware, as well as blended threats and spam, and protects from intrusion at both the gateway and the endpoint levels... (Continued) 

  • trusted PC

    The trusted PC is an industry ideal of a PC with built-in security mechanisms that place minimal reliance on the user or administrator to keep a PC and its peripheral devices secure. 

  • encryption

    Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood. 

  • Trojan horse

    In computers, a Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage. 

About UTM Appliances and Strategies

Examine the pros and cons of Unified Threat Management (UTM) security appliances and learn whether they can benefit your environment .