Essential Guide

Browse Sections

BACKGROUND IMAGE: iSTOCK/GETTY IMAGES

Unified threat management devices: Understanding UTM and its vendors

Last updated:June 2014

Editor's note

Companies are increasingly finding the idea of unified threat management (UTM) devices attractive, and vendors are responding with a range of products. While smaller companies were the logical adopters of UTM technology, now even giant enterprises see the benefits UTM has to offer.

If UTM is in your organization's future, there are several factors to consider before purchasing, including how the product incorporates various security elements, the scale of its deployment and whether it should be hardware or a virtual product.

This essential guide on UTM appliances outlines critical questions to ask potential UTM vendors and provides insight on the UTM features that will best meet your enterprise requirements. Click through now to learn more.

1The standard features of UTM

You know the seven technologies a unified threat management appliance should have, but what will those seven security capabilities do for your enterprise? Take a look at each main component of a UTM device and learn how it helps enterprises combat today's toughest security issues.

2UTM vendor overview and questions to ask them

When making any business purchase, it is critical to find the product or service that best fulfills your business needs. But with so many UTM vendors and options, how can you narrow down the list of candidates? Make your purchasing decision a little easier by learning the 10 questions you should ask when evaluating vendors, and then review our comprehensive vendor list.

3The pros and cons of unified threat management

While there are promises of unified threat management devices aplenty, UTM isn't a one-size-fits-all technology; appliances that work for one organization may not work for another. So how do you know if a UTM will work for your business? Gain further understanding of UTM devices, their pros and cons, and which organizations the technology will benefit the most.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close