Email this article   Print article 


Securing The SMB: The Value Of Unified Threat Management

By Ken Presti
January 29, 2013    1:25 PM ET

Page 2 of 2

That focus on SMBs, as opposed to the enterprise, was a driving factor in last year's departure of IBM from the UTM space, according to Jim Brennan, program director of threat protection strategy and product management at IBM.

"If you go back to the early days of UTM, it was not necessarily focused on [the] SMB," he said. "This was supposed to be the silver bullet for security. But the reality was that there was a significant performance trade-off when you begin switching on multiple technologies within a single appliance. You end up with lower performance levels, which is not acceptable at the enterprise level. UTM brings a very strong value proposition to a lot of SMBs because they don't usually need extremely high levels of performance in terms of network throughput and monitoring. So they can get the functionality and the value out of these appliances and still have a level of performance that is acceptable."

That performance hit is front and center among some of the companies who manufacture UTM devices.

"We are following Moore's law as far as performance goes," explained Kevin Flynn, senior marketing manager at Fortinet. "We have to continually boost the performance so that security becomes less and less of a speed bump."

Fortinet, which has recently rolled out a new high-performance module to support its firewall line, is also in the midst of beefing up its UTM framework to further support security for virtualization and cloud services.

"UTM is about being able to use multiple technologies to protect yourself," explained Flynn. "It's about continually adding both performance and technologies. Reputation-based technology, sandboxing, MDM support and simplified analysis are some of the key examples."

UTM is clearly becoming more strategic as time goes on. The opportunity to wrap identity and access control, security intelligence, threat management and data/application security into a single device will continue to be a solid value proposition over time.

"You've got to have all those pieces," summarized Brennan. "Threats evolve, technologies evolve, and the needs of customers will always continue to mature."

PUBLISHED JAN. 29, 2013

<< Previous | 1 | 2

To continue reading this article, please download the free CRN Tech News app for your iPad or Windows 8 device.
Related: Videos | Slide Shows | Comments

SHARE THIS ARTICLE

More Security

Recent Articles

Name Of The Game: Top 10 States For Identity Theft

A Federal Trade Commission report provides statistics on identity theft and fraud complaints in 2012. Learn which state has the dubious distinction of having the most victims.

5 Ways To Avoid A Stolen Password Pitfall

Avoiding having your email or Facebook account hijacked or bank account drained takes a little work, but following these steps can greatly reduce the risk.

5 Phishing Attack Trends You May Have Missed

Phishing attackers change their tactics often, and a new report issued by the Anti-Phishing Working Group found the latest techniques have boosted the speed and efficiency of their campaigns.

  More Slide Shows




Related Videos
Loading...