UTM appliances: How to choose among UTM vendors
Anand Sastry, Contributor
A SearchSecurity.com reader recently asked network security expert Anand Sastry: "We're in talks with vendors about purchasing a UTM device, and are having trouble winnowing down the field. How many products would you recommend actually testing on our networks, and what's the best way to decide which ones to test?"
Anand's response: One thing to keep in mind when deciding among unified threat management vendors is your existing network platform. This can not only make integration and migration a bit easier, but there may also be cost benefits to expanding a deal with an existing vendor.
UTM appliances in the enterprise: Are they enough?
UTM appliances are in high demand at small and midsize companies looking to secure their networks. But how do UTM appliances fit into a defense-in-depth strategy in the enterprise? In this tip, Michael Cobb weighs the pros and cons of using UTM devices in enterprise networks.
The case against UTM: Is there a better alternative? Read more
Sign up for more e-newsletters from SearchSecurity.com
Search Security.com offers many timely and informative newsletters. Sign up today for our newsletters on current threats, with advice on everything from finding and addressing SQL injection and cross-site scripting flaws to data breach response and business continuity planning.
Anand Sastry, Contributor
A SearchSecurity.com reader recently asked network security expert Anand Sastry: "We're in talks with vendors about purchasing a UTM device, and are having trouble winnowing down the field. How many products would you recommend actually testing on our networks, and what's the best way to decide which ones to test?"
Anand's response: One thing to keep in mind when deciding among unified threat management vendors is your existing network platform. This can not only make integration and migration a bit easier, but there may also be cost benefits to expanding a deal with an existing vendor.
UTM appliances in the enterprise: Are they enough?
UTM appliances are in high demand at small and midsize companies looking to secure their networks. But how do UTM appliances fit into a defense-in-depth strategy in the enterprise? In this tip, Michael Cobb weighs the pros and cons of using UTM devices in enterprise networks.
The case against UTM: Is there a better alternative? Read more
Sign up for more e-newsletters from SearchSecurity.com
Search Security.com offers many timely and informative newsletters. Sign up today for our newsletters on current threats, with advice on everything from finding and addressing SQL injection and cross-site scripting flaws to data breach response and business continuity planning.
No comments:
Post a Comment