Understanding these five pro-UTM arguments and referencing this buyer's guide will help value-added resellers (VARs), security consultants and systems integrators decide if unified threat management (UTM) is right for a customer's network, or if it is better to stick with existing multiple point solutions.
Unified Threat Management Guide for Managers: Be prepared
Vendors are talking about unified threat management, but is it right for you? We'll dissect the five arguments in favor of UTM.
It makes sense in theory: Combining security functionality -- such as antivirus, intrusion detection and firewall -- into one appliance gives infosecurity professionals a security Swiss Army knife of sorts.
Read more on UTM issues such as consolidation and cost, performance, complexity, management and flexibility.
Unified Threat Management Buyer's Guide
A representative list of companies that offer unified threat management appliances. For the most part, these are firewall/VPN appliances that integrate antivirus, antispam, intrusion detection/prevention and URL content filtering, typically as optional modules. Many offer SSL VPN and antispyware capabilities as well. (PDF).
About the author
Joel Snyder is a senior partner at Opus One, an IT consulting firm in Tucson, Ariz., and a technical editor for Information Security.
This was first published in April 2007