![]() Common throughput rates are 600 Mbps to 200 Gbps, with several ports that may include 10/100 Ethernet to 1, 10, 40 and 100 Gigabit Ethernet. Firewall: A next-generation firewall sits at the heart of a UTM appliance.Some vendors use antimalware scanners in the cloud, which minimizes the use of UTM appliance resources during scanning. If the antimalware scanner is appliance-based (meaning the software resides on the appliance), scans will affect the performance of the unit to some extent. ![]() Some UTM appliances include antispam features as well. Antivirus/antimalware: This component scans for malicious programs and other types of malware, and either quarantines or removes it.These core features may be described as follows: Nearly every unified threat management appliance includes the same core features, and each vendor may include additional components in various models to appeal to different customers. Characteristic features of UTM appliances Most UTM vendors offer a line of products to accommodate each type of customer. Today, UTM appliances are found in small office/home offices (SOHOs), retail, banking and similar environments, branch offices, midsize organizations and large enterprises. However, the reliability and scalability of UTM products makes them suitable for enterprise adoption as well. UTM vendors initially targeted the small to medium-sized business (SMB) market to help them reduce administrative overhead and control security costs. On the downside, UTM products also present a single point of failure should an event occur that cannot be handled proactively or remediated quickly. ![]() Plus, organizations realize lower overall costs compared to acquiring each component separately, and they can produce cohesive compliance reports when required by regulations, such as Health Insurance Portability and Accountability Act, Sarbanes-Oxley Act and so on. An administrator can react quickly to performance issues as they arise, and can monitor how changes affect other components. Centralized control also reduces complexity and the likelihood of errors because the details of each component are clearly visible on a dashboard. Unified threat management appliances simplify management by granting network administrators use of an integrated interface to configure and maintain each component. However, this article focuses on UTM appliances. Both types of UTM eliminate the need for an on-premises appliance, but still offer centralized control and ease of use. UTM virtual appliances and cloud services are gaining in popularity.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |