Search Sujata's Blogs

Saturday, 11 October 2014

Unified Threat Management (UTM) : A way to keep your network secured


UTM (Unified Threat Management)

UTM represents a significant shift in the evolution of network security technology and equipment. UTM generally refers to a security appliance that consolidates a wide range of essential network security functions into a single device, including next-generation firewall technologies like application control.
As network threats evolve and new threats emerge, network security must change and adapt to protect against such threats. This adaptability can make UTM difficult to define because the technologies included can vary from vendor to vendor. Over time, however, the collection of capabilities associated with UTM has consistently expanded, and this trend shows no sign of tapering off.
As we write this, the best UTM solutions for networks include the following core security functions in their arsenals.

  •  Network firewalls perform state full packet inspection.
  •  IPS detects and blocks intrusions and certain attacks.
  •  Application control provides visibility and control of application behavior and content.
  • VPN enables secure remote access to networks.
  • Content filtering halts access to malicious, inappropriate, or questionable websites and online content.
  •  IPv6 support in all network security functions protects networks as they migrate from IPv4 to IPv6.
  •  Support for virtualized environments, both virtual domains and virtual appliances.
 

 They also include additional security technologies that organizations can choose to deploy, including
  •   Data loss prevention that blocks accidental or intentional loss of confidential, proprietary, or regulated data.
  •  Anti-virus/anti-spam protection that prevents malicious payloads or unwanted messages from entering networks
  •   Endpoint control that enforces corporate security policies with remote users and devices.
  •  Integrated wireless LAN (WLAN) controller to consolidate all wired and wireless traffic through a single device, to simplify policy creation and enforcement while reducing network complexity.
Gartner has once again positioned Fortinet as a leader in the Unified Threat Management (UTM) Magic Quadrant for 2014.
According to Gartner, “The Leaders quadrant contains vendors at the forefront of making and selling UTM products” and “Vendors in this quadrant lead the market in offering new safeguarding features, and in enabling customers to deploy them inexpensively without significantly affecting the end-user experience or increasing staffing burdens.”
Of course, the FortiGate Connected UTM platform supports the comprehensive set of security features you would expect from a market leading UTM solution: Firewall, VPN, IPS, Anti-malware, URL and Application control. But Fortinet’s relentless commitment to innovation takes the FortiGate Connected UTM to the next level. Integrated High-Density Switching (including PoE) and Wireless LAN eliminates the need to deploy standalone switches or wireless controllers, further simplifying your network deployment and reducing management costs



                        Sujata Computers Pvt. Ltd is the Value added Distributor for the Fortinet.
 I would be glad to answer your queries, you can leave your comments or write to me at dinesh.g@sujataindia.com
Warm regards
Dinesh
Sujata Computers Pvt Ltd
Fortinet Partner & Sub-Distributor

No comments:

Post a Comment