This resource is no longer available

Taming the Wild World of Unified Threat Management

Today, nearly every firewall vendor claims to deliver Unified Threat Management (UTM). However, like beauty, UTM is in the eye of the beholder. Without a widely accepted industry definition, it's often quite challenging to make an apples-to-apples comparison when trying to select the right UTM appliance.

This Webcast explores the aspects of UTM and the functions of today's UTM products, including:

  • Moving beyond packet inspection to application layer firewalls
  • Supporting site-to-site IPsec and remote user SSL VPN tunnels
  • Complimenting desktop anti-virus by applying AV at the network gateway
  • Detecting and preventing network intrusions, including zero-day attacks


Lisa Phifer President, Core Competence Inc.

Session 3: Diverse Mobile Platforms, Complicated Security

Session 4: Safeguarding Mobile Applications

Lisa Phifer has been involved in the design, implementation, and evaluation of networking, security, and management products for over 25 years. Since joining Core Competence in 1995, she has advised companies large and small regarding security needs, product assessment, and the use of emerging technologies and best practices. Lisa teaches about wireless LANs and mobile device security and management, and has written extensively for numerous publications, such as enterpriseNetworkingPlanet, Information Security Magazine, SearchMobileComputing, SearchSecurity, and more.

Fortinet, Inc.
Mar 28, 2007, 12:00 EDT (16:00 GMT)

This resource is no longer available.