Unified threat management (UTM) is a step above the conventional firewall features as it embraces the pooled features of e-mail spam filtering, IDS (Intrusion Detection System), anti-virus capability and World Wide Web content filtering. This is a novel trend which is emerging in IT world slowly. The multiple functionality of the Unified Threat Management appliance can be the justification for replacing older more basic firewalls with the new system. In simpler words, UTM is just like a blanket security cover for Internet-based threats.
Security is the biggest threat or in other words, the utmost requirement for internet users, as the virus attack incidents are growing in corporate information system environment and the end user is always recognized as most targeted obsession for security attacks.
The principal advantages of UTM are simplicity, streamlined installation and use, and the ability to update all the security functions or programs concurrently. Some other advantages include
• Reduced Complexity: Single security solution for a couple of security threat along with single vendor.
• Reduced training: require less technical training.
• Multi-Core processor : for balancing speed and performance
• Easy Troubleshoot: Single point of contact makes troubleshooting easy
• Easy management: Web based GUI environment for easy management
• Availability: Ensure uninterrupted access by providing protection against malicious contents
• Identity based security: Identifies ‘who is doing what”
• Improved performance: Zero hour protection without interrupting network performance
UTM Implementation: The usage of UTM system is increasing in the corporate world and many companies are launching their respective products. The promise of the UTM application can be observed in the e-governance sector too. Recently, In India the Jharkhand Government’s state information and communication network has installed a UTM device to embark multiple security threats to the sensitive data like treasury information, Commercial tax information, financial information etc.
Another UTM program implemented by IBM is, the IBM Unified Threat Management (UTM) Service, part of the IBM Managed Security Services “umbrella’ provides a comprehensive protection against all security threats. The IBM setup for security is named as IBM Internet Security Systems (ISS).
Market watch for UTM: The UTM market is growing with the growing needs of security. According to a recent market report, the threat management security appliance market will grew at annual growth rate of 17 percent from 2007 to 2008 which is equal to the global market of $3.45 billion.
UTM vendors in India include LokTek, Cyberoam, Secure Computing Corporation and Symantec, NetScreen (acquired by Juniper Networks), Symantec, NetScaler, WatchGuard Technologies and Elitecore Technologies.
UTM Products: Some significant UTM products in the market are IBM Proventia Network Multi-function Security System, MX5010, IBM Proventia Network Multi-function Security System, MX3006, Fortinet FortiGate-3810A UTM, Fortinet FortiGate-3600, ISS Proventia M50, Fortinet FortiGate-1000A V3.00 and TippingPoint X505 V2.2.4, AccessEnforcer All-in-One Security Appliance by Calyptix Security Corporation and Cyberoam 1000i, 100i, 500i, 1500i by Elitecore Technologies Ltd.
Satinder Kaur/ITVoir Network
Like this post?Why not to Subscribe to Trend Internet Security news by Email for FREE
First time on my blog "Trend Internet Security?" Want to know more about Internet Security? Need some cool advices and modern Trend Internet Security tips&tricks? |
|
Subscribe to blog updates by Email or RSS |
|
Each week you will get a new post with a fresh tip concerning Trend Internet Security. I promise you, my dear reader! Or you will unsubscribe :-) |
Tuesday, May 25, 2010
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment