Upload
anthony-daniel
View
23
Download
0
Embed Size (px)
DESCRIPTION
Cyberoam Unified Threat Management or UTM appliances offer comprehensive security to organizations, ranging from large enterprises to small and branch offices.
Citation preview
7/18/2019 UTM (Unified Threat Management) Security Solutions
http://slidepdf.com/reader/full/utm-unified-threat-management-security-solutions-56d5e30d92e03 1/12
UTM (Unifed Threat Management)
Security Solutions
7/18/2019 UTM (Unified Threat Management) Security Solutions
http://slidepdf.com/reader/full/utm-unified-threat-management-security-solutions-56d5e30d92e03 2/12
Unifed Threat Management (UTM)
Unifed threat management (UTM) is an approach to security management thatallows an administrator to monitor and manage a wide variety o security-related applications and inrastructure components through a singlemanagement console.
7/18/2019 UTM (Unified Threat Management) Security Solutions
http://slidepdf.com/reader/full/utm-unified-threat-management-security-solutions-56d5e30d92e03 3/12
Feature of UTM Firewall
The Trust wave Managed UTM service includes the ollowing componentsupport:
Stateul irewall
!eep "nspection "ntrusion #revention
$e% & 'mail nti-irus$e% *ontent iltering
+ogue !evice and $ireless ccess #oint !etection
"nternal ulnera%ility Scanning
irtual #rivate ,etworing
$i-i otspot
7/18/2019 UTM (Unified Threat Management) Security Solutions
http://slidepdf.com/reader/full/utm-unified-threat-management-security-solutions-56d5e30d92e03 4/12
Benets of Using a UTM Firewallto Protect Your Business
UTM irewall includes such eatures as e-mail spam fltering/ internet
fltering/ anti-virus capa%ility/ an intrusion prevention system/ andthe traditional unctions o a frewall needed %y a small %usiness. "nsimpler terms/ this means that UTM can perorm all the unctions o anecessary frewall and more with one %o0 instead o the common twoor three %o0 system.
The frst and main %eneft o a UTM irewall is that it em%races theidea that many vital unctions are confned to one %o0. irewallsystems have a tendency to %ecome comple0 %ecause they attempt
to protect a system in a convoluted/ non-linear manner. UTM reducesthis comple0ity %y uniying each component saving small %usiness%oth time and money.
7/18/2019 UTM (Unified Threat Management) Security Solutions
http://slidepdf.com/reader/full/utm-unified-threat-management-security-solutions-56d5e30d92e03 5/12
What Sets Unied Threatmanagement Apart From Others
Unifed threat management is a frewall appliance that hasmultiple eatures. The device guards against intrusion and carriesout spam fltering/ content fltering/ antivirus detection andintrusion detection.
These were traditionally managed %y multiple systems. Unifedthreat management is designed to deal with all levels o threatsthat try to attac computer networs.
7/18/2019 UTM (Unified Threat Management) Security Solutions
http://slidepdf.com/reader/full/utm-unified-threat-management-security-solutions-56d5e30d92e03 6/12
Tips for !hoosing a UTM Securit"Solution
ly 1usiness-*lass
Su%scri%e ,ow
nd 2ic the Tires/ Too
+e3ect idden *osts
7/18/2019 UTM (Unified Threat Management) Security Solutions
http://slidepdf.com/reader/full/utm-unified-threat-management-security-solutions-56d5e30d92e03 7/12
#e" Features $ !apa%ilities ofUTM
The standard and ,e0t-4eneration ,etwor irewall (,4S) unctions include:
The a%ility to trac and maintain state inormation or communications todetermine the source and purpose o networ communications.
The a%ility to allow or %loc tra5c %ased on confgured policy (which can %e
integrated with the state inormation).
The a%ility to perorm ,etwor ddress Translation (,T) and #ort ddress Translation(#T).
The a%ility to perorm application aware networ tra5c scanning/ tracing andcontrol.
The a%ility to optimi6e a networ connection (i.e. using T*# optimi6ation).
7/18/2019 UTM (Unified Threat Management) Security Solutions
http://slidepdf.com/reader/full/utm-unified-threat-management-security-solutions-56d5e30d92e03 8/12
Key Features & Capabilities of UTMContd.
+emote ccess and Site-to-Site #, unctions include:
The a%ility to connect multiple sites securely using a #, (i.e. "#sec/ SS7).
The a%ility to have clients connect rom remote locations securely using #,(i.e. *lientless SS7/ "#sec and SS7 client).
The a%ility to connect to the device rom a remote location or the purposeso management (i.e. TT#S/ SS).
$e% ccess 4ateway unctions include:
The a%ility to perorm U+7 fltering.
The a%ility to perorm we% application monitoring and control.
The a%ility to perorm we% pplication irewall ($) unctions.
The a%ility to perorm antivirus and anti-malware scanning.
7/18/2019 UTM (Unified Threat Management) Security Solutions
http://slidepdf.com/reader/full/utm-unified-threat-management-security-solutions-56d5e30d92e03 9/12
Ad&antages of Using a Unied ThreatManagement Less Complexity- The all-in-one approach simplifies several things, such as
product integration, product selection and ongoing support.
Ease of Deployment- As lesser human intervention is required, it is easy to installand maintain. ne can get the product installed !y finding a reputed vendor online.
The "lac# "ox Approach- $sers have a ha!it of playing %ith things. &ere, the !lac#
!ox approach puts a restriction on the damage that users can cause. Thisdiminishes trou!le and enhances net%or# security.
'ntegration Capa!ilities- The appliances can !e distri!uted easily at remote sites. 'nsuch a scenario, a plug and play device can !e set up and handled remotely. Thistype of management is interactive %ith fire%alls that are soft%are- !ased.
7/18/2019 UTM (Unified Threat Management) Security Solutions
http://slidepdf.com/reader/full/utm-unified-threat-management-security-solutions-56d5e30d92e03 10/12
'isad&antages of Unied ThreatManagement
7ower perormance
Single point o ailure.
endor loc-in.
!i5cult to scale in large environments. 7imited eature set compared to point product alternatives.
7/18/2019 UTM (Unified Threat Management) Security Solutions
http://slidepdf.com/reader/full/utm-unified-threat-management-security-solutions-56d5e30d92e03 11/12
Our Social Reach
7/18/2019 UTM (Unified Threat Management) Security Solutions
http://slidepdf.com/reader/full/utm-unified-threat-management-security-solutions-56d5e30d92e03 12/12
USA !entral ( )*+,-.+/*.+/012'elhi $ 3!4 ( )1*+1011*56-66Ahmeda%ad ( )1*+11.56**-.0Bangalore( )1*+1006-/52,*'u%ai( )1,*+/+.*/ 1026
!"%eroam 7ouse8Saigulshan !omple98
Opp: Sans;ruti8Beside White 7ouse8
Panchwati !ross4oad8
Ahmeda%ad + -066628<U=A4AT8 >3'>A:
3orth America565 Thornall
Street8 Suite ?-6/
@dison8 3=+600-,USA
salesc"%eroam:com
Cyberoam Technologies