BACKGROUND IMAGE: iSTOCK/GETTY IMAGES

Unified threat management devices: Understanding UTM and its vendors

Last updated:June 2014

Editor's note

Companies are increasingly finding the idea of unified threat management (UTM) devices attractive, and vendors are responding with a range of products. While smaller companies were the logical adopters of UTM technology, now even giant enterprises see the benefits UTM has to offer.

If UTM is in your organization's future, there are several factors to consider before purchasing, including how the product incorporates various security elements, the scale of its deployment and whether it should be hardware or a virtual product.

This essential guide on UTM appliances outlines critical questions to ask potential UTM vendors and provides insight on the UTM features that will best meet your enterprise requirements. Click through now to learn more.

1What does a UTM have to offer?

A unified threat management appliance does more than just combine multiple security technologies into a single device. Major improvements in the way of convenience and price could also result from a UTM deployment. Read on to learn about four major benefits of UTM: a reduction in security incidents; improved security rollouts; reduction in infrastructure, software and labor costs; and minimized latency.

2The standard features of UTM

You know the seven technologies a unified threat management appliance should have, but what will those seven security capabilities do for your enterprise? Take a look at each main component of a UTM device and learn how it helps enterprises combat today's toughest security issues.

3UTM vendor overview and questions to ask them

When making any business purchase, it is critical to find the product or service that best fulfills your business needs. But with so many UTM vendors and options, how can you narrow down the list of candidates? Make your purchasing decision a little easier by learning the 10 questions you should ask when evaluating vendors, and then review our comprehensive vendor list.

4The pros and cons of unified threat management

While there are promises of unified threat management devices aplenty, UTM isn't a one-size-fits-all technology; appliances that work for one organization may not work for another. So how do you know if a UTM will work for your business? Gain further understanding of UTM devices, their pros and cons, and which organizations the technology will benefit the most.

5Sealing the deal: Make sure the investment pays off

Purchasing a unified threat management system is a big decision. Once you have figured out what your enterprise needs and the vendors you wish to evaluate, it's time to seal the deal. But before you do, be sure that your enterprise asks itself these five critical questions -- and knows the answers.

6Must-know UTM terms

This glossary contains common terms related to UTM that security pros should be familiar with when evaluating UTM products.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close