Unified Threat Management Guide for Managers
sponsored by Information Security Magazine

Vendors are talking about unified threat management, but is it right for you? We'll dissect the five arguments in favor of UTM.

It makes sense in theory: Combining security functionality--such as antivirus, intrusion detection and firewall--into one appliance gives infosecurity professionals a security Swiss Army knife of sorts.

In reality, however, unified threat management is not defined by what is in the appliance, but by your reason for wanting to put more than one function in a single device. There are five main arguments in favor of UTM: It provides for consolidation, thereby reducing costs; it improves performance; it reduces complexity; it simplifies management; and it increases flexibility.
Available Resources from Information Security Magazine
See what other users are reading via our Daily Top 50 Report

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement