Call me an old fuddy duddy, but I'm not a big fan of unified threat management (UTM) technology. This approach...
builds multiple security services into a single device, promising ease of management and more efficient updating, as well as reduced cost. However, I see a few major drawbacks to the UTM approach:
- Vendor lock-in -- UTM commits an enterprise to using a single vendor for its entire security infrastructure. The best-of-breed approach, however, allows security pros the freedom to choose the best security tools they can find, rather than putting all of their security eggs in a single vendor's basket.
- Questionable time-savings -- I'm not so sure that a UTM increases operational efficiencies. After all, managing an IPS, firewall and Web filter are really different tasks. While it might be possible to use a single management console to do all these things with a UTM product, you'll still be clicking around each area. How much time does it really take to open three different interfaces instead?
- Lack of redundancy -- I definitely don't like the idea of having multiple security services running on the same piece of hardware. In addition to the potential loss of defense in depth if the device is compromised, it puts the company at risk of losing all its security services in the event of a platform failure.
So, now that I've painted a bleak picture for UTM, let me temper my advice. There is definitely a place for UTM in the market, especially for midsize businesses looking for a way to add new security services to their infrastructure at the lowest possible cost. My point is to simply be wary of the potential drawbacks as well as advantages during the UTM technology evaluation process, or for that matter, when evaluating any network security technology.
For more information:
- Check out this screencast on how to configure a UTM device.
- Five considerations for securing a midmarket company: Read more.
Dig Deeper on Network device security: Appliances, firewalls and switches
Related Q&A from Mike Chapple
It's not possible to eradicate the risk of DoS attacks, but there are steps infosec pros can take to reduce their impact. Mike Chapple shares ... Continue Reading
The HHS OCR ruled that healthcare ransomware attacks are HIPAA violations, so these covered entities need to react according to the HHS's guidance. ... Continue Reading
HIPAA regulations incorporate NIST guidelines and standards, so do healthcare organizations need to be compliant with both? Expert Mike Chapple ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.