Professional Documents
Culture Documents
must have )
UTM or Universal Threat Management was coined in 2004
under the supervision of research based company IDC for
defining a class of products that defined multiple security
firewalls. Unified Threat Management (UTM) devices can be
considered to be a useful tool for reducing risks present in a
companys infrastructure working at a reduced level of cost
sharing compared to the use of other standalone devices. The
next generation firewalls has been defined by (Gartner, 2013)
in order to identify the unique features associated with
application control and application identification for firewalls.
Majority of the firewall used in the industry today needs to pass
the scrutiny of the testing practices conducted by auditors in
order to secure the business assets and financial reporting
process come out with a clear position. UTM security
appliances products operate on the principle of multiple
security features integrated in one box. In order to be included
in the category as opposed to other priority, the appliance
must have its own set of features that is synchronous to the
series of network properties like firewall definition, intrusion
detection and a complete prevention through a gateway based
antivirus. In such UTM devices that give sufficient network
capacity, frequent updates, power redundancy and high
availability, the individual entities suffering from device level
redundancy is difficult to separate based on IDC report of 2004.
Threat management security appliances are based on activity
[2]
[3]
[4]
[5]
Core Firewall
[6]
SSL VPN
[7]
Remote Endpoint
[8]
Wireless Networking
[9]
BYOD Networks
References
[1]Gartner Magic Quadrant for Unified Threat Management, Greg Young
and Jeremy DHoinne, 19 July 2013.
[2]IDC, Worldwide Threat Management Security Appliances 2004-2008
Forecast and 2003 Vendor Shares: The Rise of the Unified Threat
Management Security Appliance, 2004.
[3] Enterprise Internet (WAN) Link Connectivity Redundancy and Load
Balancing Linkhttp://www.excitingip.com/1393/enterprise-internet-wanlink-connectivity-redundancy-and-load-balancing/ Accessed on 14th April,
2015,