Unified Threat Management (UTM) is the name for an emerging trend in the appliance security market. Unified Threat Management appliancesare an evolutionof traditional firewall and VPN appliances into a product that has many additional capabilities such as: URL Filtering, spam blocking, spyware protection, intrustion prevention, gateway antivirus, and a centralized management, monitoring, and logging function. these functions were traditionally handled by multiple systems.
Why Unified Threat Management ?
Unified Threat Management Solutions are Cost-effective.
- Integrating multiple security capabilities into a single appliance mean that you can purchase and use fewer aooliances, eliminating the cost of building layered security with separately purchased solutions.
Stops Attacks as the Network Gateway to Keep Your Business Moving
- The multifunctional security approach offered by UTM appliances lets you avert catastrophe by blocking a broad range of network threats before they have the opportunity to enter your network.
Easy to setup and Use
- Separate security systems means different management consoles to configure each system. Because the management paradigms of these systems are typically very different, it can be very time consuming to make sure the different security policies on each system work together and provide adequate protection. In addition, log information from each system will be stored in different formats in different locations, making detection and analysis of security events difficult.
Whether you are an IT expert or a security novice, a UTM solution with centralized management, monitoring and logging provides indispensable ease of use for configuring and managing your security. A UTM solution makes it easy to build coherent security policies, simplefies administration tasks such as log file management, auditing, and compliance reporting, and lower operational costs when compared with the complexity of setting up separate security systems to defend against various specific threats.
Wednesday, April 2, 2008
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment