==

Unified threat management

Unified threat management


A new category of network security products -- called unified threat management (UTM) -- promises integration, convenience and protection from pretty much every threat out there; these are especially valuable for enterprise use. As Mike Rothman explains, the evolution of UTM technology and vendor offerings make these products even more valuable to enterprises.
Security expert Karen Scarfone defines UTM products as firewall appliances that not only guard against intrusion but also perform content filteringspam filtering, application control, Web content filtering, intrusion detection and antivirus duties; in other words, a UTM device combines functions traditionally handled by multiple systems. These devices are designed to combat all levels of malicious activity on the computer network.
An effective UTM solution delivers a network security platform comprised of robust and fully integrated security and networking functions along with other features, such as security management and policy management by a group or user. It is designed to protect against next generation application layer threats and offers a centralized management through a single console, all without impairing the performance of the network.
Advantages of using UTM
Convenience and ease of installation are the two key advantages of unifiedthreat management security appliances. There is also much less human intervention required to install and configure them appliances. Otheradvantages of UTM are listed below:
Reduced complexity: The integrated all-in-one approach simplifies not only product selection but also product integration, and ongoing support as well.
Ease of deployment: Since there is much less human intervention required, either vendors or the customers themselves can easily install and maintain these products.
Integration capabilities: UTM appliances can easily be deployed at remote locations without the on-site help of any security professional. In this scenario a plug-and-play appliance can be installed and managed remotely. This kind of management is synergistic with large, centralized software-based firewalls.
Black box character: Users have a tendency to play with things, and theblack box nature of a UTM limits the damage users can do and, thus, reduces help desk calls and improves security.
Troubleshooting ease: When a box fails, it is easier to swap out than troubleshoot. This process gets the node back online quicker, and a non-technical person can do it, too. This feature is especially important for remote offices without dedicated technical staff on site.
Some of the leading UTM solution providers are Check Point, CiscoDell,FortinetHPIBM and Juniper Networks.
Challenges of using UTM
UTM products are not the right solution for every environment. Many organizations already have a set of point solutions installed that, combined, provide network security capabilities similar to what UTMs offer, and there can be substantial costs involved in ripping and replacing the existing technology install a UTM replacement. There are also advantages to using the individual products together, rather than a UTM. For instance, when individual point products are combined, the IT staff is able to select the best product available for each network security capability; a UTM can mean having to compromise and acquire a single product that has stronger capabilities in some areas and weaker ones in others.


Another important consideration when evaluating UTM solutions is the size of the organization in which it would be installed. Smallest organizations might not need all the network security features of a UTM. There is no need for a smaller firm to tax its budget with a UTM if many of its functions aren't needed. On the other hand, a UTM may not be right for larger, more cyber-dependent organizations either, since these often need a level of scalability and reliability in their network security that UTM products might not support (or at least not support as well as a set of point solutions). Also a UTM system creates a single point of failure for most or all network security capabilities; UTM failure could conceivably shut down an enterprise, with a catastrophic effect on company security. How much an enterprise is willing to rely on a UTM is a question that must be asked, and answered.



Pro Teknologi dibuat pada 22 Februari 2017. Blog ini adalah harapan saya agar dapat membagi manfaat kepada orang lain,berupa tips-tips Seputar Blog,Internet,Komputer,dan Info-Info Menarik lainnya.

0 Response to "Unified threat management"

Post a Comment