Deep learning and intrusion prevention to keep networks secure.Visibility into risky activity, suspicious traffic, and advanced threats.It integrates with various VPN technologies to enable remote workers to securely connect with applications and data.Sophos Firewall includes full-featured email anti-spam, encryption, and DLP along with a web application firewall.And the Sophos Firewall communicates with other security systems on the network, enabling it to become an enforcement point to contain threats and block malware from spreading or exfiltrating data out of the network. It integrates a suite of threat protection technologies that are easy to set up and maintain. It provides visibility into risky users, unwanted applications, suspicious payloads, and persistent threats. Sophos Firewall combines the features of firewalls and UTM to offer network security with insights into network activity. Here are our top picks for UTM, in no particular order: If it is important to you, insist vendors demonstrate that such functionality is available now, not merely promised on a nebulous roadmap.Īlso read: Understanding and Preventing Zero Day Threats Top UTM VendorsĮnterprise Networking Planet considered multiple vendors. A feature that is growing in importance is to be able to parse the mountain of information collected, correlate data with other systems, and highlight critical information or threats that require action.Others are just packages tied loosely together that really only integrate on the front end. Investigate the degree of integration.As well as core functions above, ask about how the prospective vendor is incorporating new tools to stop complex, evolving attacks, how their tools can share threat intelligence with other security systems to automatically identify and isolate infected machines, and how they are incorporating analytics. The evolving threat landscape means firewalls and UTM products need to do more than ever before.As each vendor incorporates different tools in their software suites or UTM appliances, buyers should start with the features they need and then match UTM products up against those specific features.Here are some tips to help in product evaluation and selection: SSL, application control and virtual private networking (VPN) (46%)Īs you can see, there is plenty of room for variation in this market.But it all depends on the vendor, what it has in its security arsenal, and what it can cobble together via acquisitions.Īlso read: Taking the Unified Threat Management Approach to Network Security Key Features of UTMĪ Gartner analysis of UTM tools noted the following features in use, as well as their frequency: Often, they also deal with remote access, routing, WAN connectivity, threat intelligence, and more. Most include firewalls, intrusion prevention/detection systems (IPS/IDS), and secure gateways. The offerings vary considerably from vendor to vendor based on their existing product strengths, partnerships, acquisitions, and development roadmaps. It also saved on the money side as choosing one security platform tended to come with a nice discount. UTM became particularly popular in the small and mid-sized enterprise market as it saved them having to evaluate, purchase, deploy, and train personnel on multiple best-of-breed tools. These days, vendors call their products UTM, NGFW (next generation firewall), and several other labels. The term peaked in popularity a couple of years ago. Unified threat management (UTM) is an umbrella term for a hardware or software platform that integrates multiple security functions.
0 Comments
Leave a Reply. |