+ All Categories
Home > Documents > Unified Threat Management

Unified Threat Management

Date post: 30-Dec-2015
Category:
Upload: anthonydaniel
View: 87 times
Download: 0 times
Share this document with a friend
Description:
Cyberoam Unified Threat Management or UTM appliances offer comprehensive security to organizations, ranging from large enterprises to small and branch offices. - PowerPoint PPT Presentation
12
UTM (Unified Threat Management) Security Solutions
Transcript

UTM (Unified Threat Management)Security Solutions

Unified Threat Management (UTM)

Unified threat management (UTM) is an approach to security management that allows an administrator to monitor and manage a wide variety of security-related applications and infrastructure components through a single management console.

Feature of UTM Firewall

The Trust wave Managed UTM service includes the following component support:

Stateful Firewall

Deep Inspection Intrusion Prevention

Web & Email Anti-Virus

Web Content Filtering

Rogue Device and Wireless Access Point Detection

Internal Vulnerability Scanning

Virtual Private Networking

Wi-Fi Hotspot

Benefits of Using a UTM Firewall to Protect Your Business UTM Firewall includes such features as e-mail spam filtering, internet filtering, anti-

virus capability, an intrusion prevention system, and the traditional functions of a firewall needed by a small business. In simpler terms, this means that UTM can perform all the functions of a necessary firewall and more with one box instead of the common two or three box system.

The first and main benefit of a UTM Firewall is that it embraces the idea that many vital functions are confined to one box. Firewall systems have a tendency to become complex because they attempt to protect a system in a convoluted, non-linear manner. UTM reduces this complexity by unifying each component saving small business both time and money.

What Sets Unified Threat management Apart From Others?

Unified threat management is a firewall appliance that has multiple features. The device guards against intrusion and carries out spam filtering, content filtering, antivirus detection and intrusion detection.

These were traditionally managed by multiple systems. Unified threat management is designed to deal with all levels of threats that try to attack computer networks.

Tips for Choosing a UTM Security Solution

Fly Business-Class

Subscribe Now

And Kick the Tires, Too

Reject Hidden Costs

Key Features & Capabilities of UTM

The standard and Next-Generation Network Firewall (NGFS) functions include:

The ability to track and maintain state information for communications to determine the source and purpose of network communications.

The ability to allow or block traffic based on configured policy (which can be integrated with the state information).

The ability to perform Network Address Translation (NAT) and Port Address Translation(PAT).

The ability to perform application aware network traffic scanning, tracking and control.

The ability to optimize a network connection (i.e. using TCP optimization).

Key Features & Capabilities of UTM Contd.

Remote Access and Site-to-Site VPN functions include:

The ability to connect multiple sites securely using a VPN (i.e. IPsec, SSL).

The ability to have clients connect from remote locations securely using VPN (i.e. Clientless SSL, IPsec and SSL client).

The ability to connect to the device from a remote location for the purposes of management (i.e. HTTPS, SSH).

Web Access Gateway functions include:

The ability to perform URL filtering.

The ability to perform web application monitoring and control.

The ability to perform web Application Firewall (WAF) functions.

The ability to perform antivirus and anti-malware scanning.

Advantages of Using a Unified Threat Management

Less Complexity- The all-in-one approach simplifies several things, such as product integration, product selection and ongoing support.

Ease of Deployment- As lesser human intervention is required, it is easy to install and maintain. One can get the product installed by finding a reputed vendor online.

The Black Box Approach- Users have a habit of playing with things. Here, the black box approach puts a restriction on the damage that users can cause. This diminishes trouble and enhances network security.

Integration Capabilities- The appliances can be distributed easily at remote sites. In such a scenario, a plug and play device can be set up and handled remotely. This type of management is interactive with firewalls that are software- based.

Disadvantages of Unified Threat Management

Lower performance

Single point of failure.

Vendor lock-in.

Difficult to scale in large environments.

Limited feature set compared to point product alternatives.

Our Social Reach

USA Central : +1-732-412-4896Delhi & NCR : +91-9899150300Ahmedabad : +91-9925011328Bangalore: +91-9880345671 Dubai: +971-4-214 9860

Cyberoam House,Saigulshan Complex, Opp.

Sanskruti,Beside White House,

Panchwati Cross Road,Ahmedabad - 380006,

GUJARAT, INDIA.

North America505 Thornall Street,

Suite # 304Edison, NJ -08837

USA

[email protected]

Cyberoam Technologies


Recommended