Unified Threat Management

Read Complete Research Material

UNIFIED THREAT MANAGEMENT

Unified Threat Management



Table of Content

Introduction3

UTM as Consolidator4

Operational Costing5

Throughput6

Latency6

UTM Evolution7

Case Scenario7

Overview7

Performance Requirements9

Testing with Tools10

Integration Requirements11

Consolidation Support13

Platform Extensibility and Flexibility15

Management Requirements17

Advantages of using an UTM18

Conclusion19

References20

Unified Threat Management

Introduction

As threats to information and network systems continue to increase, companies and organizations with large networks are implementing different layers of security. There are firewalls, anti-virus, spam and content filtering, vulnerability scanning, and anti-penetration hardware. However, these security layers can be integrated by using UTM appliance. UTM stands for unified threat management and is considered as the most efficient way of managing security threats and vulnerabilities. With a single threat management appliance, network administrators will have an easier time detecting vulnerabilities and creating countermeasures to prevent external and internal attacks. A UTM appliance is a piece of hardware that can be deployed on a large network. Such hardware has multiple security capabilities and features so it serves as an all in one security solution for corporate networks. Once deployed, a UTM device can perform regular vulnerability scanning of the entire network. Typically, you will need a penetration testing appliance or vulnerability scanning software to detect areas in your network that could become a potential source of problems (Axent, 1999, 3).

A UTM appliance can perform such task thus rationalizing the security solution of a network. Another common security layer that is being deployed by companies is a spam and web content filtering system. Some of the most virulent viruses, Trojans, and worms penetrate a network through spam email messages. Normally, these viruses are contained in PDF attachments, media files, and streaming audios or videos. Malicious scripts and backdoor Trojans, on the other hand, may come from unsecured files downloaded through P2P sharing sites. Spam filtering systems can block such unsecured content from penetrating the network of a company. With a UTM appliance, there is no need any more to deploy additional anti spam protection because this can be accomplished by the UTM device. A UTM appliance can also be used as a control gateway of the network (Bartee, 2001, 48). Network administrators can configure such device to control the traffic coming in and going out of the network. It can also serve as a site filtering device to control the browsing activities of each workstation within the network. With its built-in vulnerability scanning capability, deploying a UTM system can significantly help IT managers and administrators in keeping the network safe from attacks. It can prevent access to desktop applications that can be used for personal purposes. It can also prevent heavy downloads of streaming media which affects the performance of corporate networks.

UTM as Consolidator

“UTM” means different things to different people. The initial intent of UTM is the consolidation of multiple security-related technologies into one system. Initially, UTM solutions were integrated Firewalls with Intrusion Detection/Intrusion Prevention Systems (IDS/IPS). Now, most UTM solutions also include Anti-X (SPAM and malware) and VPN functionality. UTM continues to evolve with expanding functionality. Potential UTM technologies include: Identity management, data leak prevention (DLP), VOIP security gateways, unified communications and collaboration ...
Related Ads
  • Unix
    www.researchomatic.com...

    UNIX functioning scheme supplies automated unifie ...

  • Wireless Networking
    www.researchomatic.com...

    Is a solution that integrates ERP + CRM ( manageme ...

  • Risk Assessment
    www.researchomatic.com...

    These risks can be embedded in their weaknesses and ...

  • Parental Control Software
    www.researchomatic.com...

    The Parental Control software let parents manage ...

  • Addressing Wireless Threa...
    www.researchomatic.com...

    The topic under study is based on addressing wireles ...