1 / 12

Unified Threat Management

Cyberoam Unified Threat Management or UTM appliances offer comprehensive security to organizations, ranging from large enterprises to small and branch offices.

Download Presentation

Unified Threat Management

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.


Presentation Transcript

  1. UTM (Unified Threat Management) Security Solutions

  2. Unified Threat Management (UTM) Unified threat management (UTM) is an approach to security management that allows an administrator to monitor and manage a wide variety of security-related applications and infrastructure components through a single management console.

  3. Feature of UTM Firewall The Trust wave Managed UTM service includes the following component support: • Stateful Firewall • Deep Inspection Intrusion Prevention • Web & Email Anti-Virus • Web Content Filtering • Rogue Device and Wireless Access Point Detection • Internal Vulnerability Scanning • Virtual Private Networking • Wi-Fi Hotspot

  4. Benefits of Using a UTM Firewall to Protect Your Business • UTM Firewall includes such features as e-mail spam filtering, internet filtering, anti-virus capability, an intrusion prevention system, and the traditional functions of a firewall needed by a small business. In simpler terms, this means that UTM can perform all the functions of a necessary firewall and more with one box instead of the common two or three box system. • The first and main benefit of a UTM Firewall is that it embraces the idea that many vital functions are confined to one box. Firewall systems have a tendency to become complex because they attempt to protect a system in a convoluted, non-linear manner. UTM reduces this complexity by unifying each component saving small business both time and money.

  5. What Sets Unified Threat management Apart From Others? • Unified threat management is a firewall appliance that has multiple features. The device guards against intrusion and carries out spam filtering, content filtering, antivirus detection and intrusion detection. • These were traditionally managed by multiple systems. Unified threat management is designed to deal with all levels of threats that try to attack computer networks.

  6. Tips for Choosing a UTM Security Solution • Fly Business-Class • Subscribe Now • And Kick the Tires, Too • Reject Hidden Costs

  7. Key Features & Capabilities of UTM The standard and Next-Generation Network Firewall (NGFS) functions include: • The ability to track and maintain state information for communications to determine the source and purpose of network communications. • The ability to allow or block traffic based on configured policy (which can be integrated with the state information). • The ability to perform Network Address Translation (NAT) and Port Address Translation(PAT). • The ability to perform application aware network traffic scanning, tracking and control. • The ability to optimize a network connection (i.e. using TCP optimization).

  8. Key Features & Capabilities of UTM Contd. Remote Access and Site-to-Site VPN functions include: • The ability to connect multiple sites securely using a VPN (i.e. IPsec, SSL). • The ability to have clients connect from remote locations securely using VPN (i.e. Clientless SSL, IPsec and SSL client). • The ability to connect to the device from a remote location for the purposes of management (i.e. HTTPS, SSH). Web Access Gateway functions include: • The ability to perform URL filtering. • The ability to perform web application monitoring and control. • The ability to perform web Application Firewall (WAF) functions. • The ability to perform antivirus and anti-malware scanning.

  9. Advantages of Using a Unified Threat Management • Less Complexity- The all-in-one approach simplifies several things, such as product integration, product selection and ongoing support. • Ease of Deployment- As lesser human intervention is required, it is easy to install and maintain. One can get the product installed by finding a reputed vendor online. • The Black Box Approach- Users have a habit of playing with things. Here, the black box approach puts a restriction on the damage that users can cause. This diminishes trouble and enhances network security. • Integration Capabilities- The appliances can be distributed easily at remote sites. In such a scenario, a plug and play device can be set up and handled remotely. This type of management is interactive with firewalls that are software- based.

  10. Disadvantages of Unified Threat Management • Lower performance • Single point of failure. • Vendor lock-in. • Difficult to scale in large environments. • Limited feature set compared to point product alternatives.

  11. Our Social Reach

  12. Cyberoam Technologies USA Central : +1-732-412-4896Delhi & NCR : +91-9899150300 Ahmedabad : +91-9925011328 Bangalore: +91-9880345671 Dubai: +971-4-214 9860 North America 505 Thornall Street, Suite # 304 Edison, NJ -08837 USA Cyberoam House, Saigulshan Complex, Opp. Sanskruti, Beside White House, Panchwati Cross Road, Ahmedabad - 380006, GUJARAT, INDIA.

More Related