Understanding these five pro-UTM arguments and referencing this buyer's guide will help value-added resellers (VARs), security consultants and systems integrators decide if unified threat management (UTM) is right for a customer's network, or if it is better to stick with existing multiple point solutions.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Unified Threat Management Guide for Managers: Be prepared
Vendors are talking about unified threat management, but is it right for you? We'll dissect the five arguments in favor of UTM.
It makes sense in theory: Combining security functionality -- such as antivirus, intrusion detection and firewall -- into one appliance gives infosecurity professionals a security Swiss Army knife of sorts.
Read more on UTM issues such as consolidation and cost, performance, complexity, management and flexibility.
Unified Threat Management Buyer's Guide
A representative list of companies that offer unified threat management appliances. For the most part, these are firewall/VPN appliances that integrate antivirus, antispam, intrusion detection/prevention and URL content filtering, typically as optional modules. Many offer SSL VPN and antispyware capabilities as well. (PDF).
Download the buyer's guide for product details.
About the author
Joel Snyder is a senior partner at Opus One, an IT consulting firm in Tucson, Ariz., and a technical editor for Information Security.