![]() ![]() Today, multiple threats cross the network boundary unpredictably through different ports. Years ago, ports were more readily mapped to applications, and understanding and stopping threats was a relatively easy task for a well-configured firewall. T the very least, Young says that a device should include the basic firewall, along with the VPN, anti-virus, anti-spam, and intrusion prevention system, to be classified as a UTM. Regardless of the debate around what is and isn’t a UTM system, the need for more than simple firewall functionality is clear. “Customers can turn on what they like, but they don’t have to turn on everything,” he says, describing his product’s feature set. Tim Helming, director of product management at UTM vendor WatchGuard, calls his brand of product ‘extensible threat management’. “It increases performance, and it also benefits you from an application perspective,” he says, explaining that users can better manage everything through a single console. “I think we are better off simply calling our stuff ‘threat management’,” says Paul Judd, regional director for the UK and Ireland at Fortinet, arguing that the security tools in his company’s appliances didn’t need to be unified in the first place.įortinet, which includes a range of features such as content web filtering and traffic shaping in one box, wrote all of the software itself rather than sourcing it from specialist providers. Not even the manufacturers seem to agree on how the term should be used. “You can’t manage threats,” he complains, adding that his company finally capitulated and started using the phrase to try and tease out a solid product definition and dispel some of the marketing hype coming from vendors. He doesn’t like the term (and not just because he didn’t think of it first). If there was a patron saint of UTM (unified threat management), it certainly wouldn’t be Greg Young, research vice president for network security at Gartner. ![]() And that’s how the new product category, like many others, was born. Then, on the sixth day, an enterprising analyst at IDC noticed all this and said ‘let there be unified threat management’. Before you knew it, the firewall was doing all kinds of things outside its original remit. Firewall vendors, eager to differentiate themselves, started adding things to their products: a VPN (virtual private network) here, and perhaps a web content scanner or an intrusion prevention system there. Unfortunately, in the IT world as in the Biblical one, things never stay simple. 11+ Application Categories: e.g.Here’s the gospel of network security: in the beginning there was the firewall, and the firewall was good. Data leakage control via HTTP, HTTPS upload Automatic real-time updates from CRProtect networks Image-based Spam filtering usingRPDTechnology Redirect Spam mails to dedicated email address Filter based on message header, size, sender, recipient Real-time Blacklist (RBL), MIME header check Scans HTTP, HTTPS, FTP, SMTP, POP3, IMAP, IM, VPN Tunnels Automatic virus signature database update MAC&IP-MAC filtering and Spoof prevention Layer 7 (Application) Control &Visibility UTM policies - IPS, Web Filtering, Application Filtering, Anti-Virus, Anti-Spam and Bandwidth Management Access Control Criteria (ACC) - User - Identity, Source & Destination Zone,MACand IP address, Service ESA supports feature enhancements that can be developed rapidly and deployed with minimum efforts. Cyberoam’s future-ready Extensible Security Architecture (ESA) offers an extensible platform that can grow with the future security needs of an organization without degrading system performance. Layer 8 technology functions along with each of Cyberoam security features to allow creation of identity-based security policies. This adds speed to an organization’s security by offering instant visibility into the source of attacks by username rather than IP address – allowing immediate remediation to restore security or allowing proactive security. It attaches user identity to security, taking organizations a step ahead of conventional solutions that bind security to IP-addresses. Cyberoam’s User Layer 8 Technology treats user-identity as the 8th Layer or the HUMAN layer in the protocol stack. Cyberoam Unified Threat Management appliances offer assured security, connectivity and productivity to Small Office-Home Office (SOHO) and Remote Office-Branch Office (ROBO) users by allowing user identity-based policy controls. ![]()
0 Comments
Leave a Reply. |