Unified Threat Management

1,600 views

Published on

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,600
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
73
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Unified Threat Management

  1. 1. Milan Petrásek16.6.2012
  2. 2. Overview Why? Traditional approach Complex solution in one box - UTM Summary
  3. 3. Internet security threatsInternet isnt safe.And creating attacks is a business.One of the first, Gozi Trojan, in 2007 was business casewith 2000% profit.
  4. 4. Spam Internet security threats II Annoying, unnecessary, junk mail Spam rate >70%MalwareShortcut MALicious softWARE• Viruses• Trojan horses• Spyware• Worms• Etc.
  5. 5. Traditional approachOne traditional response to new threats has been to add new stand-alone security technologies to a network: Antivirus Antispam Firewall IPS (Intrusion Prevention System) Etc.
  6. 6. Complex solutionUTM = Unified Threat ManagementUTM in general is a security appliance that consolidates a wide range of essential network security functions into a single device.
  7. 7. Security companies with UTM
  8. 8. Summary UTM is answer to new challenges in the „wild“ Internet UTM is integrated solution with easy management
  9. 9. SourcesSpam rate: Commtouch (http://www.commtouch.com/)Pictures: Fortinet (http://www.fortinet.com/)Magic quadrant: Gartner (http://www.gartner.com/)
  10. 10. QuestionsThank you

×