+ All Categories
Home > Documents > UTM (Unified Threat Management) Security Solutions

UTM (Unified Threat Management) Security Solutions

Date post: 02-Mar-2016
Category:
Upload: anthony-daniel
View: 21 times
Download: 0 times
Share this document with a friend
Description:
Cyberoam Unified Threat Management or UTM appliances offer comprehensive security to organizations, ranging from large enterprises to small and branch offices.
12
 UTM (Unifed Threat Management) Security Solutions
Transcript
Page 1: UTM (Unified Threat Management) Security Solutions

7/18/2019 UTM (Unified Threat Management) Security Solutions

http://slidepdf.com/reader/full/utm-unified-threat-management-security-solutions-56d5e30d92e03 1/12

UTM (Unifed Threat Management)

Security Solutions

Page 2: UTM (Unified Threat Management) Security Solutions

7/18/2019 UTM (Unified Threat Management) Security Solutions

http://slidepdf.com/reader/full/utm-unified-threat-management-security-solutions-56d5e30d92e03 2/12

 Unifed Threat Management (UTM)

Unifed threat management (UTM) is an approach to security management thatallows an administrator to monitor and manage a wide variety o security-related applications and inrastructure components through a singlemanagement console.

Page 3: UTM (Unified Threat Management) Security Solutions

7/18/2019 UTM (Unified Threat Management) Security Solutions

http://slidepdf.com/reader/full/utm-unified-threat-management-security-solutions-56d5e30d92e03 3/12

Feature of UTM Firewall

  The Trust wave Managed UTM service includes the ollowing componentsupport:

Stateul irewall

!eep "nspection "ntrusion #revention

$e% & 'mail nti-irus$e% *ontent iltering

+ogue !evice and $ireless ccess #oint !etection

"nternal ulnera%ility Scanning

irtual #rivate ,etworing

$i-i otspot

Page 4: UTM (Unified Threat Management) Security Solutions

7/18/2019 UTM (Unified Threat Management) Security Solutions

http://slidepdf.com/reader/full/utm-unified-threat-management-security-solutions-56d5e30d92e03 4/12

Benets of Using a UTM Firewallto Protect Your Business

  UTM irewall includes such eatures as e-mail spam fltering/ internet

fltering/ anti-virus capa%ility/ an intrusion prevention system/ andthe traditional unctions o a frewall needed %y a small %usiness. "nsimpler terms/ this means that UTM can perorm all the unctions o anecessary frewall and more with one %o0 instead o the common twoor three %o0 system.

 The frst and main %eneft o a UTM irewall is that it em%races theidea that many vital unctions are confned to one %o0. irewallsystems have a tendency to %ecome comple0 %ecause they attempt

to protect a system in a convoluted/ non-linear manner. UTM reducesthis comple0ity %y uniying each component saving small %usiness%oth time and money.

Page 5: UTM (Unified Threat Management) Security Solutions

7/18/2019 UTM (Unified Threat Management) Security Solutions

http://slidepdf.com/reader/full/utm-unified-threat-management-security-solutions-56d5e30d92e03 5/12

What Sets Unied Threatmanagement Apart From Others

Unifed threat management is a frewall appliance that hasmultiple eatures. The device guards against intrusion and carriesout spam fltering/ content fltering/ antivirus detection andintrusion detection.

 These were traditionally managed %y multiple systems. Unifedthreat management is designed to deal with all levels o threatsthat try to attac computer networs.

Page 6: UTM (Unified Threat Management) Security Solutions

7/18/2019 UTM (Unified Threat Management) Security Solutions

http://slidepdf.com/reader/full/utm-unified-threat-management-security-solutions-56d5e30d92e03 6/12

Tips for !hoosing a UTM Securit"Solution

  ly 1usiness-*lass

Su%scri%e ,ow

nd 2ic the Tires/ Too

+e3ect idden *osts

Page 7: UTM (Unified Threat Management) Security Solutions

7/18/2019 UTM (Unified Threat Management) Security Solutions

http://slidepdf.com/reader/full/utm-unified-threat-management-security-solutions-56d5e30d92e03 7/12

#e" Features $ !apa%ilities ofUTM

  The standard and ,e0t-4eneration ,etwor irewall (,4S) unctions include:

 The a%ility to trac and maintain state inormation or communications todetermine the source and purpose o networ communications.

 The a%ility to allow or %loc tra5c %ased on confgured policy (which can %e

integrated with the state inormation).

 The a%ility to perorm ,etwor ddress Translation (,T) and #ort ddress Translation(#T).

 The a%ility to perorm application aware networ tra5c scanning/ tracing andcontrol.

 The a%ility to optimi6e a networ connection (i.e. using T*# optimi6ation).

Page 8: UTM (Unified Threat Management) Security Solutions

7/18/2019 UTM (Unified Threat Management) Security Solutions

http://slidepdf.com/reader/full/utm-unified-threat-management-security-solutions-56d5e30d92e03 8/12

Key Features & Capabilities of UTMContd.

 +emote ccess and Site-to-Site #, unctions include:

 The a%ility to connect multiple sites securely using a #, (i.e. "#sec/ SS7).

 The a%ility to have clients connect rom remote locations securely using #,(i.e. *lientless SS7/ "#sec and SS7 client).

 The a%ility to connect to the device rom a remote location or the purposeso management (i.e. TT#S/ SS).

$e% ccess 4ateway unctions include:

 The a%ility to perorm U+7 fltering.

 The a%ility to perorm we% application monitoring and control.

 The a%ility to perorm we% pplication irewall ($) unctions.

 The a%ility to perorm antivirus and anti-malware scanning.

 

Page 9: UTM (Unified Threat Management) Security Solutions

7/18/2019 UTM (Unified Threat Management) Security Solutions

http://slidepdf.com/reader/full/utm-unified-threat-management-security-solutions-56d5e30d92e03 9/12

Ad&antages of Using a Unied ThreatManagement Less Complexity- The all-in-one approach simplifies several things, such as

product integration, product selection and ongoing support.

Ease of Deployment- As lesser human intervention is required, it is easy to installand maintain. ne can get the product installed !y finding a reputed vendor online.

The "lac# "ox Approach- $sers have a ha!it of playing %ith things. &ere, the !lac#

!ox approach puts a restriction on the damage that users can cause. Thisdiminishes trou!le and enhances net%or# security.

'ntegration Capa!ilities- The appliances can !e distri!uted easily at remote sites. 'nsuch a scenario, a plug and play device can !e set up and handled remotely. Thistype of management is interactive %ith fire%alls that are soft%are- !ased.

Page 10: UTM (Unified Threat Management) Security Solutions

7/18/2019 UTM (Unified Threat Management) Security Solutions

http://slidepdf.com/reader/full/utm-unified-threat-management-security-solutions-56d5e30d92e03 10/12

'isad&antages of Unied ThreatManagement

7ower perormance

Single point o ailure.

endor loc-in.

!i5cult to scale in large environments. 7imited eature set compared to point product alternatives.

Page 11: UTM (Unified Threat Management) Security Solutions

7/18/2019 UTM (Unified Threat Management) Security Solutions

http://slidepdf.com/reader/full/utm-unified-threat-management-security-solutions-56d5e30d92e03 11/12

Our Social Reach

Page 12: UTM (Unified Threat Management) Security Solutions

7/18/2019 UTM (Unified Threat Management) Security Solutions

http://slidepdf.com/reader/full/utm-unified-threat-management-security-solutions-56d5e30d92e03 12/12

USA !entral ( )*+,-.+/*.+/012'elhi $ 3!4 ( )1*+1011*56-66Ahmeda%ad ( )1*+11.56**-.0Bangalore( )1*+1006-/52,*'u%ai( )1,*+/+.*/ 1026

!"%eroam 7ouse8Saigulshan !omple98

Opp: Sans;ruti8Beside White 7ouse8

Panchwati !ross4oad8

Ahmeda%ad + -066628<U=A4AT8 >3'>A:

3orth America565 Thornall

Street8 Suite ?-6/

@dison8 3=+600-,USA

salesc"%eroam:com

Cyberoam Technologies


Recommended