Access your Pro+ Content below.
Unified threat management devices for the enterprise
This article is part of the Information Security magazine issue of April 2012
At its core, unified threat management (UTM) brings together three main ideas: multiple security features, integrated on the base of a firewall, in an appliance form-factor. UTM’s appeal is obvious: Why have two, three, or four security devices performing separate functions, when a single appliance will do? Managers of small and medium-sized business (SMB) networks have been quick to adopt unified threat management devices. By activating UTM firewall features such as antimalware, Web content filtering, and intrusion prevention, network managers have reduced costs, simplified configurations, and gained a unified view of their security policy. In response, almost every significant firewall vendor has added UTM features to their product line. Large enterprise networks use the same firewall software (but different hardware) as many SMB networks, but enterprise network managers have not been so quick to enable UTM features. Look at the edge of most large enterprise networks, and you’ll see devices with UTM features, but most will ...
Access this PRO+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Features in this issue
UTMs aren’t just for SMBs anymore. Here are four requirements for enterprise-grade UTM.
Tokenization protects sensitive data to reduce the compliance burden.
PKI components in smart grid and AMI infrastructure introduce new hazards.
Accuvant analysis and hacking contests illustrate browser security improvements.
Columns in this issue
It’s easy to be cynical about the latest security buzzword, but don’t be so quick to dismiss it.
Security expert Marcus Ranum talks with Peter Kuper, a partner with In-Q-Tel focused on funding compelling startups to accelerate innovation for the intelligence community.
New technologies and business models are rapidly changing the role of the security pro.