BACKGROUND IMAGE: iSTOCK/GETTY IMAGES

This content is part of the Essential Guide: Unified threat management devices: Understanding UTM and its vendors
Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Scoping out the UTM market: UTM vendors at a glance

This comprehensive list of UTM vendors aims to help enterprises evaluate who's who in the UTM market.

With so many different products and services, the UTM market can be a hard place to navigate. Each vendor offering...

can vary greatly in terms of capabilities, mitigations, features and price.

After determining what your organization needs from a UTM appliance, it is critical to find the vendor that best suits your business needs. Below is a representative list of unified threat management vendors your organization could consider.

About the author:
Karen Scarfone is the principal consultant for Scarfone Cybersecurity in Clifton, Virginia. She provides cybersecurity publication consulting services, specializing in network and system security guidelines. Scarfone was formerly a senior computer scientist for the National Institute of Standards and Technology (NIST), where she oversaw the development of system and network security publications for federal civilian agencies and the public.

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close