Essential Guide

Unified threat management devices: Understanding UTM and its vendors

A comprehensive collection of articles, videos and more, hand-picked by our editors

Scoping out the UTM market: UTM vendors at a glance

This comprehensive list of UTM vendors aims to help enterprises evaluate who's who in the UTM market.

With so many different products and services, the UTM market can be a hard place to navigate. Each vendor offering...

can vary greatly in terms of capabilities, mitigations, features and price.

After determining what your organization needs from a UTM appliance, it is critical to find the vendor that best suits your business needs. Below is a representative list of unified threat management vendors your organization could consider.

About the author:
Karen Scarfone is the principal consultant for Scarfone Cybersecurity in Clifton, Virginia. She provides cybersecurity publication consulting services, specializing in network and system security guidelines. Scarfone was formerly a senior computer scientist for the National Institute of Standards and Technology (NIST), where she oversaw the development of system and network security publications for federal civilian agencies and the public.

This was last published in June 2014

PRO+

Content

Find more PRO+ content and other member only offers, here.

Essential Guide

Unified threat management devices: Understanding UTM and its vendors

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close