Essential Guide

Unified threat management devices: Understanding UTM and its vendors

A comprehensive collection of articles, videos and more, hand-picked by our editors

Scoping out the UTM market: UTM vendors at a glance

This comprehensive list of UTM vendors aims to help enterprises evaluate who's who in the UTM market.

With so many different products and services, the UTM market can be a hard place to navigate. Each vendor offering can vary greatly in terms of capabilities, mitigations, features and price.

After determining what your organization needs from a UTM appliance, it is critical to find the vendor that best suits your business needs. Below is a representative list of unified threat management vendors your organization could consider.

About the author:
Karen Scarfone is the principal consultant for Scarfone Cybersecurity in Clifton, Virginia. She provides cybersecurity publication consulting services, specializing in network and system security guidelines. Scarfone was formerly a senior computer scientist for the National Institute of Standards and Technology (NIST), where she oversaw the development of system and network security publications for federal civilian agencies and the public.

This was first published in June 2014

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

Essential Guide

Unified threat management devices: Understanding UTM and its vendors

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close