IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Integrated Threat Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: UTM, Security Threat Management, Threat Management, Unified Threat Management, ITM
DEFINITION: Unified threat management (UTM) refers to a comprehensive security product that includes protection against multiple threats. A UTM product typically includes a firewall, antivirus software, content filtering and a spam filter in a single integrated package. The term was originally coined by IDC, a provider of market data, analytics and related services. UTM vendors include Fortinet, LokTek, Secure  … 
Definition continues below.
Integrated Threat ManagementWhite Papers (View All Report Types)
26 - 38 of 38 Matches Previous Page  |  Next Page
Practical Advantages of Fireware® XTM for Hands-On IT Administrators
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Take a look at the new XTM (extensible threat management) network security from WatchGuard. See the tangible benefits this new generation of security solutions offers. No hype -- just concrete examples of XTM features and the advantages they deliver for you to evaluate against your current security.
Posted: 26 Oct 2009 | Published: 26 Jul 2009

WatchGuard Technologies, Inc.

7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction
sponsored by Qualys, Inc.
WHITE PAPER: Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk?
Posted: 20 Oct 2009 | Published: 20 Oct 2009

Qualys, Inc.

Should You Install Messaging Security Software on Your Exchange Server?
sponsored by Sunbelt Software
WHITE PAPER: This white paper discusses the pros and cons of installing third-party software on the Exchange Server, and information on Sunbelt Software's Ninja Email Security.
Posted: 24 Nov 2008 | Published: 06 Aug 2008

Sunbelt Software

Unified Threat Management: The Best Defense against Blended Threats
sponsored by SonicWALL
WHITE PAPER: The SonicWALL® Unified Threat Management solution (UTM) provides the most intelligent, real-time network protection against sophisticated application-layer and content-based attacks.
Posted: 28 Apr 2008 | Published: 01 Jan 2005

SonicWALL

The Advantages of Multi-Core Architecture in Unified Threat Management (UTM) Solutions
sponsored by SonicWALL
WHITE PAPER: Securing your company's network requires a comprehensive approach that includes intrusion prevention, data leak protection, and content filtering. This white paper examines how UTM solutions provide enhanced security that is efficient and cost-effective.
Posted: 28 Apr 2008 | Published: 01 Apr 2008

SonicWALL

Understanding and Selecting a Data Loss Prevention Solution
sponsored by Websense, Inc.
WHITE PAPER: Data Loss Prevention is a confusing market, but by understanding the capabilities of DLP tools you can choose an appropriate tool. This report will provide the necessary background in DLP to help you find the best match for your organization.
Posted: 03 Apr 2008 | Published: 03 Apr 2008

Websense, Inc.

Unified Threat Management (UTM) Solutions
sponsored by SonicWALL
WHITE PAPER: This series of technical briefs examines the key factors you need to consider regarding unified threat management (UTM) solutions as they impact security, performance, management, and consolidation.
Posted: 05 Dec 2007 | Published: 01 Dec 2007

SonicWALL

Antispyware Buyers Checklist -- Meeting Your Organization's Needs for Enterprise Antispyware Protection
sponsored by Sunbelt Software
WHITE PAPER: Learn about all the necessary requirements to best protect your network from spyware and other malware and what to look for in an antispyware solution.
Posted: 31 Oct 2007 | Published: 31 Oct 2007

Sunbelt Software

Examining SSL-encrypted Communications
sponsored by Netronome Systems
WHITE PAPER: SSL-encrypted communications have enabled a variety of secure, web-based communications and online transactions. This paper explores the drivers behind the increase in SSL usage and the methods used to confront the security challenges that SSL creates.
Posted: 26 Oct 2007 | Published: 16 Oct 2007

Netronome Systems

Advantages of Integrated Messaging Security
sponsored by Symantec Corporation
WHITE PAPER: This paper shows you how selecting an integrated messaging security solution reduces wasted IT effort, allows centralized management and permits a single support resource without the finger-pointing that can happen in a multi-vendor environ...
Posted: 03 Aug 2007 | Published: 03 Aug 2007

Symantec Corporation

Best Practices for Deploying LAN Security and NAC
sponsored by Nevis Networks
WHITE PAPER: Download this paper and discover best practices for planning and deploying a LAN Security solution. Learn about an integrated security strategy that provides reactive protection to identify and filter out malware attacks that infiltrate your network.
Posted: 05 Mar 2007 | Published: 01 Mar 2007

Nevis Networks

Multi-Layer Security Platforms: The New Definition of Best of Breed
sponsored by Fortinet, Inc.
WHITE PAPER: Significant changes in the threat, technology, and regulatory landscapes are forcing organizations to implement an array of security controls. This white paper explores the benefits of integrating multiple security layers into a single solution.
Posted: 01 Feb 2007 | Published: 01 Jun 2006

Fortinet, Inc.

The Essential Elements of Comprehensive Endpoint Security
sponsored by Symantec Corporation
WHITE PAPER: Establishing a comprehensive endpoint security solution is a complicated undertaking. This paper will clarify the various aspects of the endpoint security problem and identify the functional requirements of a comprehensive endpoint security solution.
Posted: 27 Mar 2006 | Published: 01 Feb 2006

Symantec Corporation
26 - 38 of 38 Matches Previous Page    1 2    Next Page
 
INTEGRATED THREAT MANAGEMENT DEFINITION (continued): …  Computing Corporation and Symantec.The principal advantages of UTM are simplicity, streamlined installation and use, and the ability to update all the security functions or programs concurrently. As the nature and diversity of Internet threats evolves and grows more complex, UTM products can be tailored to keep up with them all. This eliminates the need for systems administrators to maintain multiple security programs over time.Getting started with unified threat management To explore how UTM is used in the enterprise, here is an additional resource:Introduction to UTM: Learn about the fundamentals … 
Integrated Threat Management definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement