Email Alerts
-
Weight lifter: Appliances that lighten your security load
"All-in-one" security appliances offering similar features can be surprisingly different under the hood. To better understand the capabilities of these security gateways, Information Security compared six appliances designed for midsized compa... E-Zine
-
Readers' Choice Awards 2011
Readers voted on the best unified threat management products, including UTM appliances that feature firewall, VPN, gateway antivirusm URL Web filtering and antispam. Guide
-
Instructor's note: Answers explained
Security School
-
Lesson/Domain 5 -- Security School: Training for CISSP Certification
Security School webcasts are focused on CISSP training. This lesson corresponds to the telecommunications and networking domain in the CISSP exam's "Common Body of Knowledge." School
-
Quiz: Securing your network
Test your knowledge of network security. Quiz
-
Blue Coat to acquire UTM networking firm Crossbeam
Blue Coat said Crossbeam gives it a platform for its software and also helps bolster its network optimization strategy in high-end data centers. News | 17 Dec 2012
-
Gartner report: UTM market on the upswing, expert says
Gartner released a report detailing market growth from 2010-2011 throughout the UTM vendor industry. News | 14 May 2012
-
Security expert calls for overhaul of traditional networks
A new "Zero Trust" security model could help prevent insider attacks and eliminate trustless external networks. News | 04 Oct 2010
-
Microsoft releases Forefront Threat Management Gateway
Microsoft introduces the successor to the ISA Server, the Forefront Threat Management Gateway. TMG introduce Web security to the ISA line, which was long used as a proxy server. Article | 03 Dec 2009
-
Sourcefire to ignite new offerings for virtualisation security
The firm behind the popular Snort IDS will foray into virtualisation security later this year in its Sourcefire 3D system with traffic inspection between virtual machines. Article | 03 Jul 2009
-
Virtual appliances boost flexibility, improve security
Companies see the benefits of placing network-oriented security on a faster processor. Column | 18 Jun 2009
-
Microsoft Threat Management Gateway has some drawbacks
Microsoft's new gateway lacks policy enforcement integration and does not detect the presence of sensitive data or provide PCI features. Column | 17 Mar 2009
-
Check Point to acquire Nokia security appliance business
Check Point said its acquisition of Nokia's security business will help it expand its line of security products. Article | 22 Dec 2008
-
McAfee adds NAC module, appliance for unified policy enforcement
McAfee addresses its NAC gaps while customers seek ways to meld network and endpoint security technologies. Article | 20 Oct 2008
-
IBM announcements mark two years of ISS marriage
The ISS unit has produced a number of updates, including unified threat management for small businesses and a virtual appliance for its network intrusion prevention system (IPS). Article | 25 Sep 2008
- See more News on UTM Appliances and Strategies
-
UTM appliances in the enterprise: Are they enough?
UTM appliances are in high demand at small and midsize companies looking to secure the network. But how do UTM appliances fit into a defense-in-depth strategy in the enterprise? In this tip, Michael Cobb weighs the pros and cons of using UTM devices ... Tip
-
Checklist: Three firewall configuration tips
If you are revisiting your firewall configurations, consider these three tips to help you monitor and manage your network traffic. Tip
-
Three ways to prioritize endpoint security over perimeter defenses
Midmarket organizations should prioritize endpoint security management over perimeter defenses. Tip
-
UTM appliances bundle security, give VARs multiple revenue streams
Unified threat management (UTM) appliances have replaced simple firewall/VPNs in the SMB market. VARs profit through appliance sales, recurring revenue through software subscriptions and managed security services. Tip
-
Enterprise UTM security: The best threat management solution?
Unified threat management technology is touted as the cure-all for enterprise network security. But is UTM the best product for keeping threats at bay? Expert Mike Chapple explains the pros and cons of UTM and when UTM might be right for your busines... Tip
-
Screencast: How to configure a UTM device
Unified threat management technologies provide protection against various network attacks, but properly configuring UTM boxes can be a whole other battle. In this exclusive screencast, expert David Strom gives an easy-to-follow, on-screen demonstrati... Tip
-
The real deal on plug n' play security appliances
Scott Sidel exposes the truth about plug n' play security appliances. Tip
-
Don't overlook the 'appliance connection' when choosing VPN links
Network appliances can often do double duty as VPNs. Here is a sampling of such appliances. Tip
-
Appliances have the edge over general-purpose servers
Find out why security appliances are preferred over general-purpose servers. Tip
-
Product Review: SnapGear by CyberGuard PCI635
SnapGear by CyberGuard PCI635 is an embedded NIC-based firewall that provides stateful packet inspection, Snort-based IDS, VPN, QoS packet shaping and Web caching. Tip
-
What is the value of the Lockheed Martin cyber kill chain?
Expert Brad Casey analyzes the value of the Lockheed Martin cyber kill chain strategy, emphasizing data exfiltration over intrusion prevention. Answer
-
UTM devices: Efficient security or a firewall failure risk?
UTM devices provide more protection than a simple firewall, but do they increase the risk of an enterprise firewall failure? Answer
-
Next-gen firewall vs. UTM device: Which is better for Web 2.0 risks?
How does a next-gen firewall differ from a UTM device, and how does each stack up against Web 2.0 risks? Answer
-
UTM appliances: How to choose among UTM vendors
Choosing a UTM appliance is a big job, as testing can take months and the costs aren't negligible. In this expert response, get advice on how many UTM devices to test, and what to consider during the testing process. Ask the Expert
-
The case against UTM: Is there a better alternative?
Unified threat management (UTM) promises tighter security with less required oversight, but are there security risks inherent in deploying UTM appliances? Enterprise network security expert Mike Chapple weighs in. Ask the Expert
-
distributed denial-of-service attack (DDoS)
On the Internet, a distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. Definition
-
denial of service (DoS)
A denial of service (DoS) attack is an incident in which a user or organization is deprived of the services of a resource they would normally expect to have. Typically, the loss of service is the inability of a particular network service, such as e-m... Definition
-
integrated threat management
Integrated threat management is a comprehensive approach to network security that addresses multiple types of malware, as well as blended threats and spam, and protects from intrusion at both the gateway and the endpoint levels... (Continued) Definition
-
trusted PC
The trusted PC is an industry ideal of a PC with built-in security mechanisms that place minimal reliance on the user or administrator to keep a PC and its peripheral devices secure. Definition
-
encryption
Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood. Definition
-
Trojan horse
In computers, a Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage. Definition
-
digital certificate
A digital certificate is an electronic "credit card" that establishes your credentials when doing business or other transactions on the Web. Definition
-
Next-generation firewalls: Top five myths and misconceptions about firewalls
In this podcast, Joel Snyder dispels the top five myths, misconceptions and lies about firewalls. Podcast
-
Evaluating next-generation firewalls
In this presentation, Joel Snyder discusses best practices for evaluating next-generation firewalls. Video
-
What is the value of the Lockheed Martin cyber kill chain?
Expert Brad Casey analyzes the value of the Lockheed Martin cyber kill chain strategy, emphasizing data exfiltration over intrusion prevention. Answer
-
Next-generation firewalls: Top five myths and misconceptions about firewalls
In this podcast, Joel Snyder dispels the top five myths, misconceptions and lies about firewalls. Podcast
-
Evaluating next-generation firewalls
In this presentation, Joel Snyder discusses best practices for evaluating next-generation firewalls. Video
-
distributed denial-of-service attack (DDoS)
On the Internet, a distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. Definition
-
Blue Coat to acquire UTM networking firm Crossbeam
Blue Coat said Crossbeam gives it a platform for its software and also helps bolster its network optimization strategy in high-end data centers. News
-
Gartner report: UTM market on the upswing, expert says
Gartner released a report detailing market growth from 2010-2011 throughout the UTM vendor industry. News
-
UTM devices: Efficient security or a firewall failure risk?
UTM devices provide more protection than a simple firewall, but do they increase the risk of an enterprise firewall failure? Answer
-
Readers' Choice Awards 2011
Readers voted on the best unified threat management products, including UTM appliances that feature firewall, VPN, gateway antivirusm URL Web filtering and antispam. Guide
-
Next-gen firewall vs. UTM device: Which is better for Web 2.0 risks?
How does a next-gen firewall differ from a UTM device, and how does each stack up against Web 2.0 risks? Answer
-
Security expert calls for overhaul of traditional networks
A new "Zero Trust" security model could help prevent insider attacks and eliminate trustless external networks. News
- See more All on UTM Appliances and Strategies
About UTM Appliances and Strategies
Examine the pros and cons of Unified Threat Management (UTM) security appliances and learn whether they can benefit your environment .
Security Management Strategies for the CIO