Working of
UTM
Presented by:-
Dhruv Parmar
Presentation
Overview
LIST OF TOPICS
Introduction
Threats
Features
Types
Advantages & Disadvantages
Next generation
Conclusion
Introduction
UNIFIED THREAT
MANAGEMENT (UTM)
is an approach to security
management that allows an
administrator to monitor and manage
a wide variety of security-related
applications and infrastructure
components through a single
management console
Threats
VIRUSES AND
WORMS
Threats
A THREAT, IN THE
CONTEXT OF COMPUTER
SECURITY, REFERS TO
ANYTHING THAT HAS THE
POTENTIAL TO CAUSE
SERIOUS HARM TO A
COMPUTER SYSTEM
DATA
BREACHES
PHISHING
ATTACKS
DOS & DDOS
ADWARE AND
SPYWARE SQL
INJECTION
ATTACKSPOOFING
ATTACKS
MAN-IN-THE-
MIDDLE
ATTACKS
EMAIL SPAM
Features
FIREWAL INSPECTION
URL FILTERING
VIRTUAL PRIVATE
NETWORK
INTRUSION PREVENTION
ANTI-VIRUS
ANTI SPAM
Advantages
REDUCE COMPLEXITY
EASY MANAGEMENT
EASY TO TROUBLESHOOT
SIMPLICITY
Disadvantages
LOWER PERFORMANCE
VENDOR LOCK-IN
DIFFICULT TO SCALE IN
LARGE ENVIRONMENTS
SINGLE POINT OF FAILURE
Next Generation Firewall
Conclusion
UTM IS ANSWER TO NEW CHALLENGES IN
THE "WILD" INTERNET.
UTM IS INTEGRATED SOLUTION WITH EASY
MANAGEMENT
UTM OFFERS COMPLETE SUPPORT FOR
ALL USERS
Thank you

Unified Thread Management