Documente Academic
Documente Profesional
Documente Cultură
T-500
www.seqrite.com
Table of Contents Introduction
1. Introduction 01 Cybersecurity is one of the most serious problems SMBs and enterprises today are grappling with.
2. Current methodologies for handling cyber threat Data and information security is a constant struggle for them. Companies have to keep their
and where they fail 02 businesses running and also secure their own as well as their customers’ data from breaches.
3. Understanding Unified Threat Management 03 In recent times, cyber threats have multiplied in their frequency, intensity, and sophistication. It has
become no easy task for the CISOs to ward off the cyber attackers and keep their data secure, and
4. An Effective Unified Threat Management Solution:
Seqrite Terminator 05 they have to turn to newer and more comprehensive means to achieve this goal.
5. Summary 06 The traditional ways of securing applications and infrastructure involved the use of firewalls and
protection mechanisms for different kinds of threats, through discrete functions. UTM changes all
that, by employing a single appliance that performs various security functions. This whitepaper
examines how to implement a UTM solution effectively.
IDS/IPS » Having multiple devices also takes up more rack space at the data center, and leads to greater
VPN Server
power consumption, which might not be in alignment with the organization’s green initiatives.
Overcoming all these drawbacks and responding better to the challenging security environment of
WAN Optimizer
today has been a top worry of CISOs across the industries. Today organizations may rely on an
integrated approach to network security and productivity that combines the traditionally disparate point
technologies into a single manageable entity.
Content Filter
Unified Threat Management, or UTM for short, is being employed widely today and has proven to be a
solution for most of these challenges. Let’s look at what Unified Threat Management is and how it
addresses the problems of the legacy ways of managing the organization’s security.
UTM
Switch Single pane of glass reporting and control: UTM covers all aspects of security management across the network and
applications, from one place.
Firewall: It provides firewall protection to block and selectively allow trusted packets and connections from external
networks. The firewall action is of two types: stateful and stateless. A stateless firewall examines each packet
header and selectively allows or blocks it according to policy. But a stateful firewall is application aware; it
Corporate Servers recognizes legitimate and illegitimate flows and connections, and decides based on this awareness as well as the
policy. Stateful firewalls are more powerful and effective, but they come at the cost of speed. A stateless firewall is
simple but fast. The decision must be taken to implement the right firewall action depending on the threat perception
and the ‘need for speed’.
IDS and IPS: Intrusion Detection and Prevention Systems scan the system and network for abnormal and
anomalous activities and flows. They detect possible or actual security breach attempts, prevent violations and help
Client PCs isolate compromised systems.
VPN service: A Virtual Private Network allows remote connections from users outside the company’s network, and
Fig 2: How UTM simplifies the network by aggregating is used for inter-office communications across campuses. They offer tunneling through the Internet through secure
multiple security functions encryption.
Content filtering: It prevents employees from accessing potentially hazardous content on the Internet. The same is
also governed by policies, for example, access policy concerning the risk profile of the specific employee groups.
Gateway intercept: This feature of the UTM solution protects and isolates network from virus and spam
Hardware Consolidation: With UTM, multiple devices are consolidated into one appliance or one
cloud-based UTM service. It reduces the data center clutter and consequently the carbon footprint as
well. It also makes the system easier to monitor and manage.
Single Vendor Management: Managing the support and licensing is greatly simplified if you have to
dela with only one vendor. UTM provides this advantage and there is no possibility of buck-passing
between multiple vendors.
Managing Blended Threats: Blended threats involve simultaneous attacks through phishing mails,
virus/malware/DDoS attacks, IOT based attacks and so on. With a single appliance controlling all the
Security breaches usually entail more functions, the threats can be correlated and addressed in a unified manner.
recovery efforts than acts of God. Unlike Simplified Patch Management: Loopholes need to be patched on a regular basis, and with UTM a
proverbial lightning, breaches of security single unified patch is applied across the services, making it simpler and more effective in reducing
can be counted on to strike twice unless lapses to laxity in patch management.
the route of compromise has been shut off.
Cost Reduction: Having a single box to manage ultimately leads to lower TCO for the buyer.
- FedCIRC
Request Demo
Certifications
Quick Heal Technologies Limited
TOP PRODUCT
Corporate office: Marvel Edge, Office No. 7010 C & D, 7th Floor,
17
/20