Utm buyers guide Network protection and UTM Buyers Guide Using a UTM solution for your network protection used to be a compromise ??while you gained in resource savings and ease of use there was a payof in terms of protection capabilities Now network prot
Network protection and UTM Buyers Guide Using a UTM solution for your network protection used to be a compromise ??while you gained in resource savings and ease of use there was a payof in terms of protection capabilities Now network protection through a UTM solution gives you the best of both worlds You can enjoy the highest standards of network security plus the ability to integrate multiple security capabilities within a single platform Add security capabilities as you need them when you need them CThis buyers guide is designed to help you choose the right solution for your organization It looks at the factors you should consider when evaluating solutions to ensure you have the protection and functionality you need both now and as your business evolves CHow to use this guide This guide details the capabilities to look for when evaluating security solutions It's separated into individual protection areas ?? network web email etc ??for ease of of use It also includes suggested questions to ask your vendors to help you identify which solution best meets your requirements At the end of the document is a product comparison check list Some of the data is already supplied and you can also add in additional requirements you may have to meet the needs of your organization What is UTM Uni ?ed threat management UTM is a suite of security software integrated into a single platform upholding consistent security policies and protection across the organization You choose which security elements you use and manage them all through a single platform with a centralized management console According to Gartner UTM products need to provide the following functions as a minimum ? Standard network stateful ?rewall functions ? Remote access and site-to-site virtual private network VPN support ? Web-security gateway functionality anti-malware URL and content ?ltering ? Network intrusion prevention focused on blocking attacks against unpatched Windows PCs and servers When reviewing UTM solutions there are two things you should consider Think of the overall bene ?ts ofered by the UTM approach as well as how the individual network security features meet your speci ?c requirements Next-generation ?rewalls NGFW Right now next-generation ?rewalls are a hot topic Many vendors vary in their description of exactly what constitutes a NGFW However there is widespread agreement that in essence a NGFW goes beyond a traditional ?rewall protecting organizations in a world where everything is about the web The four core features of a NGFW are Application visibility and control Optimizing the use of the internet connection s Clear understandable Intrusion Prevention Systems IPS Seamless VPN for connecting to remote sites and allowing access for remote users Many UTM solutions ofer NGFW capabilities It ? s important is to understand what you need to do so you can evaluate solutions against your requirements Network protection and UTM Buyers Guide C Gartner Magic Quadrant for Uni ?ed Threat Management Network protection and UTM Buyers Guide CEvaluating solutions security features Network protection Cyber-criminals are continually changing their attack
Documents similaires
-
30
-
0
-
0
Licence et utilisation
Gratuit pour un usage personnel Aucune attribution requise- Détails
- Publié le Aoû 31, 2021
- Catégorie Management
- Langue French
- Taille du fichier 63.5kB