Utm Buyers Guide
Utm Buyers Guide
Utm Buyers Guide
protection and
UTM Buyers
Guide
Using a UTM solution for your network protection used to be
a compromisewhile you gained in resource savings and
ease of use, there was a payof in terms of protection
capabilities. Now, network protection through a UTM
solution gives you the best of both worlds. You can enjoy
the highest standards of network security, plus the ability to
integrate multiple security capabilities within a single
platform. Add security capabilities as you need them, when
you need them.
What is UTM?
Unified threat management (UTM) is a suite of security software
integrated into a single platform, upholding consistent security
policies and protection across the organization. You choose
which security elements you use, and manage them all through
a single platform with a centralized management console.
According to Gartner*, UTM products need to provide the following functions as a minimum:
Description
IPS
Bandwidth control/
Quality of service
Site-to-site VPN options Links remote sites with the main office,
allowing users
to send and receive information via a secure
connection. Also allows employees to use
devices such as file servers and printers that
are not in the same office.
Remote access options Allows users to securely
connect to the
UTM appliance from any
location.
Web protection
You may already block access to potentially dangerous URLs with a web
filter. But many filters inspect traffic from the sidelines, providing little if
any malware scanning.
You need web protection that allows you to apply terms and conditions
to where and how users spend their time online, and stops spyware and
viruses before they can enter the network. Detailed reports should show
you how efective your policy is so you can make adjustments.
Capability to look for
Description
URL filtering
Spyware protection
installing on
Application control
employees
Description
Email protection
Protecting email against spam and viruses isnt a new problem. But,
email security threats continually evolve, making email protection a
full-time job that never ends. You need
email protection so that common email problems like spam, viruses and
the leaking of confidential information dont afect your business.
Capability to look for
Description
Anti-spam
Antivirus scanning
content at
Email encryption
eavesdroppers
User portal
Webserver protection
Every weakness in your web application is exposed when you connect a
server to the Internet. And securing each and every configuration and line
of code is probably out of the question.
Webserver protection stops hackers from using attacks like SQL
injection and cross-site scripting from stealing sensitive information like
credit card data and personal health information. And it should help you
achieve regulatory compliance when a web application firewall is
required.
A web application firewall scans activity and identifies attempts to
exploit web applications, preventing network probes and attacks.
Capability to look for
Description
Form hardening
Inspects and validates the information
submitted by visitors
via forms on your websites. Prevents
invalid data from damaging or exploiting
your server as it is processed.
Antivirus scanning
gateway to stop
URL hardening
accessing
Wireless protection
Wireless networks require the same security policies and protection as the
main corporate network. Unfortunately, they are often operated by network
administrators as two separate networks. Wireless protection from your
UTM vendor should reduce if not eliminate the problem of enforcing
consistent security policies across your organization.
Make sure your wireless protection extends UTM security features to
your wireless networks. And it should provide a way for you to centrally
manage the wireless network. Protect your network and data equally,
regardless of whether your employees are plugged in or accessing the
network over the air.
Capability to look for
Description
Integrated security
WPA/WPA 2 encryption
options
Detailed reporting
Endpoint protection
Your corporate network grows and changes every time a laptop or
mobile device connects to it. To maintain a secure network, you need
endpoint protection that checks connecting devices for current updates
and security policies.
Your endpoint protection also needs to protect company-owned devices on
and of the network. Reduce your management efort and save money by
integrating your endpoints directly into your UTM appliance. This also
helps to achieve regulatory compliance when diferent antivirus engines
are running at the gateway and on the endpoint.
Capability to look for
Description
Ease of deployment
to easily
Device control
Real-time reporting
endpoints
Ease-of-use
UTM solutions by their nature help reduce day-to-day IT administrative
time and efort. However, the level of resource savings will vary
depending on how easy the solution is to use. Consider both the initial
start-up period, and also regular activities that your IT teams and your
staf perform.
Side-by-side comparision
Use our Product Comparison checklist on the next page to see which
solution best meets your specific needs.
Conclusion
By focusing on the checklists in this buyers guide and working closely
with your vendor, you can find a UTM product that provides the
protection you need now and in the future. So you get network threat
protection with less efort, less complexity and for less money.
Sophos UTM
Try it now for free at
sophos.com/try-utm.
Email: sales@sophos.com
Email: nasales@sophos.com
A
u
SOPHOS
UTM
SONICWALL
NSA
CORE SECURITY
WATCH
GUARD
XTM
FORTINET
Fortigate
CHECK
POINT
UTM-1
Firewall
Concurrent, independent AV
Engines
Integrated Endpoint Protection
Limited
Limited
Limited
Limited
Limited
Limited
Limited
1000
s
Larger
models
Larger
models
Fe
w
Few
Few
Fe
w
Leade
r
Leade
r
Leade
r
Limited
Larger
models
Leade
r
Larger
models
Leader
Larger
models
ADDITIONAL REQUIREMENTS
10