Top Banner
UTM (Unified Threat Management) Security Solutions
12
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Utm (unified threat management) security solutions

UTM (Unified Threat Management) Security Solutions

Page 2: Utm (unified threat management) security solutions

Unified Threat Management (UTM)

Unified threat management (UTM) is an approach to security management that allows an administrator to monitor and manage a wide variety of security-related applications and infrastructure components through a single management console.

Page 3: Utm (unified threat management) security solutions

Feature of UTM Firewall

The Trust wave Managed UTM service includes the following component support:

Stateful Firewall

Deep Inspection Intrusion Prevention

Web & Email Anti-Virus

Web Content Filtering

Rogue Device and Wireless Access Point Detection

Internal Vulnerability Scanning

Virtual Private Networking

Wi-Fi Hotspot

Page 4: Utm (unified threat management) security solutions

Benefits of Using a UTM Firewall to Protect Your Business

UTM Firewall includes such features as e-mail spam filtering, internet filtering, anti-

virus capability, an intrusion prevention system, and the traditional functions of a firewall needed by a small business. In simpler terms, this means that UTM can perform all the functions of a necessary firewall and more with one box instead of the common two or three box system.

The first and main benefit of a UTM Firewall is that it embraces the idea that many vital functions are confined to one box. Firewall systems have a tendency to become complex because they attempt to protect a system in a convoluted, non-linear manner. UTM reduces this complexity by unifying each component saving small business both time and money.

Page 5: Utm (unified threat management) security solutions

What Sets Unified Threat management Apart From Others?

Unified threat management is a firewall appliance that has multiple features. The device guards against intrusion and carries out spam filtering, content filtering, antivirus detection and intrusion detection.

These were traditionally managed by multiple systems. Unified threat management is designed to deal with all levels of threats that try to attack computer networks.

Page 6: Utm (unified threat management) security solutions

Tips for Choosing a UTM Security Solution

Fly Business-Class

Subscribe Now

And Kick the Tires, Too

Reject Hidden Costs

Page 7: Utm (unified threat management) security solutions

Key Features & Capabilities of UTM

The standard and Next-Generation Network Firewall (NGFS) functions include: The ability to track and maintain state information for communications to determine the source

and purpose of network communications.

The ability to allow or block traffic based on configured policy (which can be integrated with the state information).

The ability to perform Network Address Translation (NAT) and Port Address Translation(PAT).

The ability to perform application aware network traffic scanning, tracking and control.

The ability to optimize a network connection (i.e. using TCP optimization).

Page 8: Utm (unified threat management) security solutions

Key Features & Capabilities of UTM Contd.

Remote Access and Site-to-Site VPN functions include: The ability to connect multiple sites securely using a VPN (i.e. IPsec, SSL).

The ability to have clients connect from remote locations securely using VPN (i.e. Clientless SSL, IPsec and SSL client).

The ability to connect to the device from a remote location for the purposes of management (i.e. HTTPS, SSH).

Web Access Gateway functions include: The ability to perform URL filtering.

The ability to perform web application monitoring and control.

The ability to perform web Application Firewall (WAF) functions.

The ability to perform antivirus and anti-malware scanning.

Page 9: Utm (unified threat management) security solutions

Advantages of Using a Unified Threat Management

Less Complexity- The all-in-one approach simplifies several things, such as product integration, product selection and ongoing support.

Ease of Deployment- As lesser human intervention is required, it is easy to install and maintain. One can get the product installed by finding a reputed vendor online.

The Black Box Approach- Users have a habit of playing with things. Here, the black box approach puts a restriction on the damage that users can cause. This diminishes trouble and enhances network security.

Integration Capabilities- The appliances can be distributed easily at remote sites. In such a scenario, a plug and play device can be set up and handled remotely. This type of management is interactive with firewalls that are software- based.

Page 10: Utm (unified threat management) security solutions

Disadvantages of Unified Threat Management

Lower performance

Single point of failure.

Vendor lock-in.

Difficult to scale in large environments.

Limited feature set compared to point product alternatives.

Page 12: Utm (unified threat management) security solutions

USA Central : +1-732-412-4896 Delhi & NCR : +91-9899150300 Ahmedabad : +91-9925011328 Bangalore: +91-9880345671 Dubai: +971-4-214 9860

Cyberoam House, Saigulshan Complex, Opp.

Sanskruti, Beside White House,

Panchwati Cross Road, Ahmedabad - 380006,

GUJARAT, INDIA.

North America 505 Thornall Street,

Suite # 304 Edison, NJ -08837

USA

[email protected]

Cyberoam Technologies