PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
March 2007

Enterprise UTM products differ from all-in-one SMB appliances

The industry has seen a steady shift from standalone technologies like firewalls to unified threat management (UTM) appliances. These devices, which integrate antivirus, antispyware, intrusion prevention and firewall onto a single platform with a common policy engine and centralized alerts and logs, have long appealed to small and midsized businesses short on staff and budget. But do these all-in-one appliances have a place in the enterprise, where best-of-breed has been the top choice to meet more complex needs? Richard Isenberg, director of security engineering at CheckFree, thinks so. Operating from 19 locations with 3,500 employees, CheckFree processes 1,500 electronic payment transactions per second for more than 2,000 financial firms worldwide. Replacing a complex architecture of 20 IPS boxes, 26 firewalls, 20 switches and numerous proxies with seven UTM devices cut costs and improved reliability, he says. Return on CheckFree's UTM investment is substantial: $226,000 per year. "That comes from eliminating licenses and ...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

  • Product review: Six removable device control security products

    Six removable device control security products that provide centrally managed granular control over ports, interfaces and storage devices are reviewed. This review evaluates: DeviceLock 6.0 from SmartLine, Sanctuary Device Con-trol 4.0 from SecureWave, Endpoint Access Manager 3.0 from ControlGuard, Device-Wall 4.5 from Centennial Software, Safend Protector 3.1 from Safend and Protect Mobile from Workshare.

  • Prioritizing compliance and information security

    Have compliance demands refocused and weakened information security efforts?

Columns in this issue