Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Best Unified Threat Management Products 2009

Readers voted on the best unified threat management products, including UTM appliances that feature firewall, VPN, gateway antivirusm URL Web filtering and antispam.

Cisco Systems ASA 5500 Series Adaptive Security Appliance
Cisco Systems

Networking behemoth Cisco got the nod for gold in the UTM category. Readers were pleased with the breadth off functionality offered on their ASA 5500 devices. Users of the UTM were also very satisfied with the vendor service and support they received as well as the form factor of the device.

IBM ISS Proventia Network Multi-Function Security (MFS)
IBM Internet Security Systems

The ISS Proventia, now owned by IBM, offered a wide range of security functions in one box and the form factor was very attractive to its users. What's more, users felt that each individual feature was as robust as standalone products and offered adequate security. They were also pleased with the choice of additional add-ons available to them.

Check Point Software Technologies UTM-1
Check Point Software Technologies

Check Point users were pleased with the breadth of security functionality for their UTM offerings. They scored the higher than Cisco and IBM in the category of ease of installation, configuration and the administration of the UTM devices. Users felt they are getting their money's worth, an important consideration in today's difficult economy.

"Selecting a UTM solution is like a box of chocolates… you never know what you are going to get. Baseline UTM functionality includes firewall, AV, IPS/IDS and VPNs. New UTM functionality is turning to capabilities to help [users] address many "channels" including email, web, instant messaging, peer-to-peer file sharing and voice over IP, for the potential loss or exposure of sensitive data." -- Derek E. Brink, vice president and research fellow, IT security, Aberdeen Group


  Introduction and Methodology
  Best Antimalware Products
  Best Application Security Products
  Best Authentication Products
  Best Data Loss Prevention Products
  Best Email Security Products
  Best Identity and Access Management Products
  Best Intrusion Detection and Prevention Products
  Best Mobile Data Security Products
  Best Network Access Control Products
  Best Network Firewalls
  Best Risk and Policy Management Products
  Best Secure Remote Access Products
  Best Security Information and Event Management Products
  Best Unified Threat Management Products
  Best Vulnerability Management Products
  Best Web Security Gateway Products
  Best Wireless Security Products
This was last published in September 2009

Dig Deeper on Network device security: Appliances, firewalls and switches

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.