Advanced Cyber Security

Encyclopedia / Encyclopedia Part 3 /

What is a UTM? 

Viruses continue to linger in the online world and it gradually became difficult to suppress these damaging attacks on many computer systems.

Simple firewalls and antivirus programs are no longer effective as hackers create more tricky methods in order to scare the whole web community.

UTM Appliance

And, just recently, the most up-to-date security solution Came into existence and it has become the long-awaited answer to the prevailing problems regarding online security.

This newly-created, wide-ranging solution is called the Unified Threat Management or UTM.

UTM is the solution that became well-established just some time ago in the business of network security.

This process of providing more intense safety became most popular in the year 2004 as it turned out to be the number one network gateway defense method that was continuously used by various agencies in the past years.

The total amount of money from the global distribution of the Unified Threat Management in the market already reached 1.2 billion US dollars during the year 2007.

And, many of the economists believed that there will be a compounded annual growth rate of about 35 to 40 percent as years pass by until 2011.

Based on analysis made by the IT security experts concerned, Unified Threat Management appears as a more developed form of the firewall primarily used during the previous years.

It is a very essential tool because it was found out that UTM does not only block attacks from vicious online criminals but it also executes other security operations such as content and spam filtering as well as intrusion recognition.

This is also very unique because it has antivirus functions, which is commonly a component of a different program.

From the simple security firewall, the more updated product became a more complete security pack, which has many security features built into a single tool.

Included in its more specific protective utilities are the following: network intrusion prevention and gateway antivirus (AV), network firewall, VPN, gateway anti-spam, on-appliance reporting, content filtering, and load balancing.

➤ Related pages
Anti Spam Firewall VPN
Appliance VS Software
Cloud Security
What is CISSP?
What is Data Leak Prevention?
What is Dumpster Diving?
What is GSM Encryption?
What is Grey Listing?
What is Port Knocking?
What is Spyware?
What is TCP?
What is UDP?
What is UTM?
What is Virus?
What is Whitelisting?
What is a Man in the Middle Attack?
What is a Routing Table?
What is search engine hacking?
WiFi Pen Test