Wikipedia

Unified threat management

Also found in: Dictionary, Medical, Acronyms, Encyclopedia.

Unified threat management (UTM) is an approach to information security where a single hardware or software installation provides multiple security functions. This contrasts with the traditional method of having point solutions for each security function.[1] UTM simplifies information-security management by providing a single management and reporting point for the security administrator rather than managing multiple products from different vendors.[2][3] UTM appliances have been gaining popularity since 2009, partly because the all-in-one approach simplifies installation, configuration and maintenance.[4] Such a setup saves time, money and people when compared to the management of multiple security systems. Instead of having several single-function appliances, all needing individual familiarity, attention and support, network administrators can centrally administer their security defenses from one computer. Some of the prominent UTM brands are Fortinet, Sophos, WiJungle, SonicWall and Check Point.[5]

Features

UTMs at the minimum should have some converged security features like

Some of the other features commonly found in UTMs are:

  • Gateway anti-virus
  • Application layer (Layer 7) firewall and control
  • Deep packet inspection
  • Web proxy and content filtering
  • Email filtering
  • Data loss prevention (DLP)
  • Security information and event management (SIEM)
  • Virtual private network (VPN)
  • Network access control
  • Network tarpit
  • Additional security services against Denial of Services (DoS), Distributed Denial of service (DDoS), Zero day, Spyware protection

Disadvantages

Although an UTM offers ease of management from a single device, it also introduces a single point of failure within the IT infrastructure. Additionally, the approach of a UTM may go against one of the basic information assurance / security approaches of defense in depth, as a UTM would replace multiple security products, and compromise at the UTM layer will break the entire defense-in-depth approach.[6]

References

  1. ^ "Unified Threat Management". Gartner. Archived from the original on 13 Jul 2017. Retrieved 11 December 2017.
  2. ^ "Unified threat management devices". Techtarget. Wayback Machine. Archived from the original on 11 December 2017. Retrieved 11 December 2017.
  3. ^ "UTM and Firewall Growth Drive the Worldwide Security Appliance Market Expansion in Q2 2017". Business Wire. Wayback Machine. Archived from the original on 11 December 2017. Retrieved 11 December 2017.
  4. ^ "What are common (and uncommon) unified threat management features?". SearchMidmarketSecurity. Retrieved 2019-04-04.
  5. ^ "10 Top Unified Threat Management Vendors". web.archive.org. 2019-07-23. Retrieved 2019-07-23.
  6. ^ Todd McGuiness. "Defense in Depth". sans.org. Archived from the original on 22 Dec 2017. Retrieved 22 December 2017.
This article is copied from an article on Wikipedia® - the free encyclopedia created and edited by its online user community. The text was not checked or edited by anyone on our staff. Although the vast majority of Wikipedia® encyclopedia articles provide accurate and timely information, please do not assume the accuracy of any particular article. This article is distributed under the terms of GNU Free Documentation License.

Copyright © 2003-2025 Farlex, Inc Disclaimer
All content on this website, including dictionary, thesaurus, literature, geography, and other reference data is for informational purposes only. This information should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional.