UTM Appliances and Strategies News
December 17, 2012
Blue Coat said Crossbeam gives it a platform for its software and also helps bolster its network optimization strategy in high-end data centers.
May 14, 2012
Gartner released a report detailing market growth from 2010-2011 throughout the UTM vendor industry.
December 03, 2009
Microsoft introduces the successor to the ISA Server, the Forefront Threat Management Gateway. TMG introduce Web security to the ISA line, which was long used as a proxy server.
June 18, 2009
Companies see the benefits of placing network-oriented security on a faster processor.
UTM Appliances and Strategies Get Started
Bring yourself up to speed with our introductory content
A Trojan horse is a program that appears harmless but is, in fact, malicious. Attackers have long used Trojan horses as a way to trick end users into installing malware. Continue Reading
Expert Ed Tittel examines the top unified threat management appliances to determine which one could be the best for your organization. Continue Reading
Expert Ed Tittel explores key criteria for evaluating unified threat management (UTM) appliances to determine the best choice for your organization. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate UTM Appliances and Strategies Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert David Strom explains why the feature-rich Dell SonicWall NSA Series of enterprise unified threat management devices may take some getting used to. Continue Reading
Expert Ed Tittel examines WatchGuard UTM appliances that bundle different kinds of network infrastructure protection into a single device for small, midsize and large businesses. Continue Reading
Expert Ed Tittel looks at the Sophos SG Series of unified threat management appliances, which bundle various kinds of network infrastructure protection into a single device. Continue Reading
Manage UTM Appliances and Strategies
Learn to apply best practices and optimize your operations.
What's the difference between unified threat management (UTM) products and next-generation firewalls (NGFW)? Brad Casey discusses. Continue Reading
Companies are increasingly finding attractive the idea of unified threat management (UTM) systems, and vendors are responding with a range of products. Originally, smaller companies were the logical adopters of UTM technology, but now even giant ... Continue Reading
David Strom demonstrates the enterprise-grade features making unified threat management devices viable for large companies. Continue Reading
Problem Solve UTM Appliances and Strategies Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Should enterprises deploy cloud-based UTM when it's billed by the hour? Brad Casey discusses the pros and cons of the offering. Continue Reading
Expert Brad Casey analyzes the value of the Lockheed Martin cyber kill chain strategy, emphasizing data exfiltration over intrusion prevention. Continue Reading
UTM devices provide more protection than a simple firewall, but do they increase the risk of an enterprise firewall failure? Continue Reading