23
• Unified Threat Management https://store.theartofservice.com/the-unified-threat- management-toolkit.html

Unified Threat Management

Embed Size (px)

Citation preview

• Unified Threat Management

https://store.theartofservice.com/the-unified-threat-management-toolkit.html

Check Point VPN-1 - Version history

1 NG AI R57 April 2005SecurePlatform NG AI R57 For product Check Point Express CI

(Content Inspection), later VPN-1 UTM (Unified Threat Management)

https://store.theartofservice.com/the-unified-threat-management-toolkit.html

Network security - Homes & Small Businesses

1 basic firewall or a unified threat management system.

https://store.theartofservice.com/the-unified-threat-management-toolkit.html

Network security - Medium businesses

1 A fairly strong firewall or Unified

Threat Management System

https://store.theartofservice.com/the-unified-threat-management-toolkit.html

Netsentron

1 NetSentron is a network security appliance designed and sold by Kobelt Development Inc. (KDI), a Surrey, British Columbia-based IT

services company. The NetSentron appliance is a firewall, website

content filter, and virtual private network remote access device—often

referred to as a unified threat management product.

https://store.theartofservice.com/the-unified-threat-management-toolkit.html

Unified threat management

1 Unified threat management (UTM) is a comprehensive solution that has recently emerged in the network

security industry, and since 2004 it has gained widespread currency as a

primary network gateway defense solution for organizations

https://store.theartofservice.com/the-unified-threat-management-toolkit.html

ZoneAlarm Z100G

1 ZoneAlarm Secure Wireless Router Z100G is a discontinued Unified

Threat Management security router for the home and SOHO market.

https://store.theartofservice.com/the-unified-threat-management-toolkit.html

Bypass switch

1 A 'bypass switch' is a hardware device that provides a fail-safe

access port for an in-line monitoring appliance such as an intrusion

prevention system (IPS), firewall, WAN optimization device or unified

threat management system

https://store.theartofservice.com/the-unified-threat-management-toolkit.html

Information Security Operations Center - Technology

1 SOCs typically are based around a security information and event management (SIEM) system which aggregates and correlates data from security feeds such as network discovery and vulnerability

assessment systems; governance, risk and compliance (GRC) systems; web site assessment and

monitoring systems, application and database scanners; penetration testing tools; intrusion

detection systems (IDS); intrusion prevention system (IPS); log management systems; network behavior analysis and denial of service monitoring; wireless intrusion prevention system; firewalls, enterprise antivirus and unified threat management (UTM)

https://store.theartofservice.com/the-unified-threat-management-toolkit.html

SonicWall

1 These include devices providing services for firewall (networking)|network firewalls, UTMs unified

threat management|(Unified Threat Management), VPNs virtual private network|(Virtual Private Network), backup|backup and recovery, and

anti-spam for email

https://store.theartofservice.com/the-unified-threat-management-toolkit.html

Fortinet

1 Fortinet's position as the revenue leader in Unified Threat Management

(UTM) has been validated by International Data Corporation|IDC

several times over.

https://store.theartofservice.com/the-unified-threat-management-toolkit.html

Fortinet - Product overview

1 This is necessary in a Unified Threat Management context where total

control over incoming malware and viruses is a key attribute

https://store.theartofservice.com/the-unified-threat-management-toolkit.html

Sophos

1 'Sophos' is a developer and vendor of security software and hardware,

providing Communication endpoint|endpoint, encryption, email, World

Wide Web|web, mobile device|mobile and network security as well as

Unified Threat Management products. Sophos is largely focused

on providing security to organisations and businesses.

https://store.theartofservice.com/the-unified-threat-management-toolkit.html

ZoneAlarm Z100G

1 'ZoneAlarm Secure Wireless Router Z100G' is a discontinued Unified

Threat Management security router for the home and Small office/home

office|SOHO market.

https://store.theartofservice.com/the-unified-threat-management-toolkit.html

Security appliance - Types of security appliances

1 * 'Unified Threat Management' (UTM) appliances combine features

together into one system, such as some firewalls, content filtering, Web

cache|web caching etc.

https://store.theartofservice.com/the-unified-threat-management-toolkit.html

Untangle

1 'Untangle' is a privately held company based in Sunnyvale, California, which produces and

supports the software and hardware versions of the Untangle firewall

(computing)|firewall Unified threat management|UTM computer

network|networking application. Untangle is used by nearly 40,000

organizations worldwide.https://store.theartofservice.com/the-unified-threat-management-toolkit.html

Untangle - History

1 Untangle released a free bookmark utility called SaveFace in May 2010, in response to continued loosening of default privacy settings in Facebook user accounts. In June 2010 Untangle released Untangle 7.3, enabling the company's software to be used by OEM hardware manufacturers to

produce their own branded multi-function firewalls and Unified Threat Management|UTM appliances. In August 2010 Untangle released

Untangle 7.4, wherein it simplified its packages to Lite, Standard, and Premium.

https://store.theartofservice.com/the-unified-threat-management-toolkit.html

Cyberoam

1 The company offers User Identity-based network security in its Next-Generation Firewalls/ Unified Threat

Management appliances, allowing visibility and granular control into WHO is accessing WHAT in

Business|business networks.[http://www.scmagazine.com/utm/article/217442 UTM Reviews] - By Peter Stephenson, SC Magazine, 1 December 2011 For Small office/home office|SOHO,

Small and medium businesses|SMB and large enterprise software|enterprise networks, this ensures security built around the network user for protection

against Advanced persistent threat|APTs, insider threats, malware, Hacker (computer security)|hacker,

and other sophisticated network attacks.https://store.theartofservice.com/the-unified-threat-management-toolkit.html

Cyberoam - Cyberoam addresses the industry-prevalent security flaw in HTTPs scan

1 Cyberoam issued an over-the-air (OTA) update for its unified threat management (UTM)

appliances[http://www.scmagazine.com/cyberoam-updates-utm-certs-to-avoid-traffic-snooping/article/249833/ Cyberoam updates

UTM certs to avoid traffic snooping] - By Darren Pauli, SC Magazine Australia, 11 July 2012 in order to force the devices to use unique certificate authority (CA) SSL certificates when intercepting SSL

traffic on corporate networks.[http://www.cyberoam.com/blog/cyberoams-proactive-

steps-in-https-deep-scan-inspection/ Cyberoam’s Proactive Steps in HTTPS Deep Scan Inspection] - Cyberoam Blog, 9 July 2012 After

the hotfix was applied,[http://www.pcworld.com/article/258973/cyberoam_fixes_ssl

_snooping_hole_in_network_security_appliances.html Cyberoam Fixes SSL Snooping Hole in Network Security Appliances] - By

Lucian Constantin, IDG News Service, 9 Jul 2012 each individual appliance was required to have its unique CA certificate.

https://store.theartofservice.com/the-unified-threat-management-toolkit.html

Real-time protection - Alternative solutions

1 Installed antivirus solutions, running on an individual computers, although the most used, is only one method of

guarding against malware. Other alternative solutions are also used,

including: Unified Threat Management (Unified Threat

Management|UTM), hardware and network firewalls, Cloud computing|Cloud-based antivirus and on-line

scanners.https://store.theartofservice.com/the-unified-threat-management-toolkit.html

List of antivirus software - Criteria

1 * 'software' products: no Unified Threat Management|UTM or other

computer hardware|hardware appliances;

https://store.theartofservice.com/the-unified-threat-management-toolkit.html

Deep content inspection - Background

1 New generation of Network Content Security devices such as Unified

threat management|Unified Threat Management or Next Generation

Firewalls (Garner RAS Core Research Note G00174908) use DPI to prevent attacks from a small percentage of

viruses and worms; the signatures of these malware fit within the payload

of a DPI’s inspection scopehttps://store.theartofservice.com/the-unified-threat-management-toolkit.html