SlideShare a Scribd company logo
1 of 10
Download to read offline
Milan Petrásek
16.6.2012
Overview
 Why?
 Traditional approach
 Complex solution in one box - UTM
 Summary
Internet security threats
Internet isn't safe.
And creating attacks is a business.


One of the first, Gozi Trojan, in 2007 was business case
with 2000% profit.
Spam
       Internet security threats II
 Annoying, unnecessary, junk mail
 Spam rate >70%




Malware
Shortcut MALicious softWARE
• Viruses
• Trojan horses
• Spyware
• Worms
• Etc.
Traditional approach
One traditional response to new threats has been to add new
 stand-alone security technologies to a network:

 Antivirus
 Antispam
 Firewall
 IPS (Intrusion Prevention
 System)
 Etc.
Complex solution
UTM = Unified Threat
  Management




UTM in general is a security
  appliance that consolidates a
  wide range of essential
  network security functions
  into a single device.
Security companies with UTM
Summary
 UTM is answer to new challenges in the „wild“
  Internet
 UTM is integrated solution with easy management
Sources

Spam rate:
 Commtouch (http://www.commtouch.com/)
Pictures:
 Fortinet (http://www.fortinet.com/)
Magic quadrant:
 Gartner (http://www.gartner.com/)
Questions




Thank you

More Related Content

What's hot

Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionImportance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionHTS Hosting
 
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
All  about Firewalls ,IPS IDS and the era of UTM in a nutshellAll  about Firewalls ,IPS IDS and the era of UTM in a nutshell
All about Firewalls ,IPS IDS and the era of UTM in a nutshellHishan Shouketh
 
Network Security Risk
Network Security RiskNetwork Security Risk
Network Security RiskDedi Dwianto
 
mcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdfmcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdfANJUMOHANANU
 
Nice network intrusion detection and countermeasure
Nice network intrusion detection and countermeasureNice network intrusion detection and countermeasure
Nice network intrusion detection and countermeasureIEEEFINALYEARPROJECTS
 
Distributed network security management
Distributed network security managementDistributed network security management
Distributed network security managementSwati Sinha
 
Next Generation Firewall and IPS
Next Generation Firewall and IPSNext Generation Firewall and IPS
Next Generation Firewall and IPSData#3 Limited
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfANJUMOHANANU
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)Zara Nawaz
 
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computingLinux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computingSeo Tss
 
edu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxedu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxANJUMOHANANU
 
Next Generation Firewalls
Next Generation FirewallsNext Generation Firewalls
Next Generation FirewallsThe eCore Group
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Network security 22.1.18
Network security 22.1.18Network security 22.1.18
Network security 22.1.18Philip_
 
Network management and security
Network management and securityNetwork management and security
Network management and securityAnkit Bhandari
 

What's hot (20)

Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionImportance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat Protection
 
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
All  about Firewalls ,IPS IDS and the era of UTM in a nutshellAll  about Firewalls ,IPS IDS and the era of UTM in a nutshell
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
 
Network Security Risk
Network Security RiskNetwork Security Risk
Network Security Risk
 
Euro mGov Securing Mobile Services
Euro mGov Securing Mobile ServicesEuro mGov Securing Mobile Services
Euro mGov Securing Mobile Services
 
mcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdfmcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdf
 
Nice network intrusion detection and countermeasure
Nice network intrusion detection and countermeasureNice network intrusion detection and countermeasure
Nice network intrusion detection and countermeasure
 
NSA and PT
NSA and PTNSA and PT
NSA and PT
 
Distributed network security management
Distributed network security managementDistributed network security management
Distributed network security management
 
Next Generation Firewall and IPS
Next Generation Firewall and IPSNext Generation Firewall and IPS
Next Generation Firewall and IPS
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
 
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computingLinux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
Linux mail-server-firewall-dealers-thinclient-antivirus-cloud-computing
 
edu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxedu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptx
 
Next Generation Firewalls
Next Generation FirewallsNext Generation Firewalls
Next Generation Firewalls
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Network security 22.1.18
Network security 22.1.18Network security 22.1.18
Network security 22.1.18
 
Sangfor ngfw 修订版
Sangfor ngfw 修订版Sangfor ngfw 修订版
Sangfor ngfw 修订版
 
Network management and security
Network management and securityNetwork management and security
Network management and security
 
Mobile slide
Mobile slideMobile slide
Mobile slide
 
06686259 20140405 205404
06686259 20140405 20540406686259 20140405 205404
06686259 20140405 205404
 

Similar to Unified Threat Management

Unified threat management
Unified threat managementUnified threat management
Unified threat managementYabibo
 
Protect your Business from Hackers!
Protect your Business from Hackers!Protect your Business from Hackers!
Protect your Business from Hackers!SkyWireInc
 
Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Lana Sorrels
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security
 
Enterprise Immune System
Enterprise Immune SystemEnterprise Immune System
Enterprise Immune SystemAustin Eppstein
 
Security Challenges and Innovative Solutions for Securing a Complex World
Security Challenges and Innovative Solutions for Securing a Complex WorldSecurity Challenges and Innovative Solutions for Securing a Complex World
Security Challenges and Innovative Solutions for Securing a Complex WorldInfotecsGmbH
 
Unlocking the Promise of UTM Protection
Unlocking the Promise of UTM ProtectionUnlocking the Promise of UTM Protection
Unlocking the Promise of UTM ProtectionKerry Desberg
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityLumension
 
The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityLumension
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking SectorSamvel Gevorgyan
 
Security Starts at the Endpoint
Security Starts at the EndpointSecurity Starts at the Endpoint
Security Starts at the EndpointElasticsearch
 
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]Nancy Nimmegeers
 
Anti virus in the corporate arena
Anti virus in the corporate arenaAnti virus in the corporate arena
Anti virus in the corporate arenaUltraUploader
 
2010 Sc World Congress Nyc
2010 Sc World Congress Nyc2010 Sc World Congress Nyc
2010 Sc World Congress NycBob Maley
 
TRAPMINE Next-Generation Endpoint Security
TRAPMINE Next-Generation Endpoint SecurityTRAPMINE Next-Generation Endpoint Security
TRAPMINE Next-Generation Endpoint SecurityTRAPMINE
 
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?IBM Security
 

Similar to Unified Threat Management (20)

Unified threat management
Unified threat managementUnified threat management
Unified threat management
 
Are You Wondering Why Your Organization Needs a Unified Threat Management Sys...
Are You Wondering Why Your Organization Needs a Unified Threat Management Sys...Are You Wondering Why Your Organization Needs a Unified Threat Management Sys...
Are You Wondering Why Your Organization Needs a Unified Threat Management Sys...
 
Protect your Business from Hackers!
Protect your Business from Hackers!Protect your Business from Hackers!
Protect your Business from Hackers!
 
Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...
 
Are You Wondering Why Your Organization Needs An Unified Threat Management Sy...
Are You Wondering Why Your Organization Needs An Unified Threat Management Sy...Are You Wondering Why Your Organization Needs An Unified Threat Management Sy...
Are You Wondering Why Your Organization Needs An Unified Threat Management Sy...
 
Cybersecurity Concerns You Should be Thinking About
Cybersecurity Concerns You Should be Thinking AboutCybersecurity Concerns You Should be Thinking About
Cybersecurity Concerns You Should be Thinking About
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint Protection
 
Enterprise Immune System
Enterprise Immune SystemEnterprise Immune System
Enterprise Immune System
 
Security Challenges and Innovative Solutions for Securing a Complex World
Security Challenges and Innovative Solutions for Securing a Complex WorldSecurity Challenges and Innovative Solutions for Securing a Complex World
Security Challenges and Innovative Solutions for Securing a Complex World
 
Unlocking the Promise of UTM Protection
Unlocking the Promise of UTM ProtectionUnlocking the Promise of UTM Protection
Unlocking the Promise of UTM Protection
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
 
The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day Reality
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking Sector
 
Security Starts at the Endpoint
Security Starts at the EndpointSecurity Starts at the Endpoint
Security Starts at the Endpoint
 
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
 
Presentation gdl
Presentation gdlPresentation gdl
Presentation gdl
 
Anti virus in the corporate arena
Anti virus in the corporate arenaAnti virus in the corporate arena
Anti virus in the corporate arena
 
2010 Sc World Congress Nyc
2010 Sc World Congress Nyc2010 Sc World Congress Nyc
2010 Sc World Congress Nyc
 
TRAPMINE Next-Generation Endpoint Security
TRAPMINE Next-Generation Endpoint SecurityTRAPMINE Next-Generation Endpoint Security
TRAPMINE Next-Generation Endpoint Security
 
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
 

More from Milan Petrásek

O2 Firewally nové generace
O2 Firewally nové generaceO2 Firewally nové generace
O2 Firewally nové generaceMilan Petrásek
 
Bezpečná firma - koncepce GTS
Bezpečná firma - koncepce GTSBezpečná firma - koncepce GTS
Bezpečná firma - koncepce GTSMilan Petrásek
 
HighEnd a Mainframe procesory Itanium, SPARC, POWER
HighEnd a Mainframe procesory Itanium, SPARC, POWERHighEnd a Mainframe procesory Itanium, SPARC, POWER
HighEnd a Mainframe procesory Itanium, SPARC, POWERMilan Petrásek
 
DDoS ochrana pro setkání CSIRT.CZ
DDoS ochrana pro setkání CSIRT.CZDDoS ochrana pro setkání CSIRT.CZ
DDoS ochrana pro setkání CSIRT.CZMilan Petrásek
 
Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity ManagementMilan Petrásek
 
GTS platforma pro vyvojáře webexpo 2012
GTS platforma pro vyvojáře webexpo 2012GTS platforma pro vyvojáře webexpo 2012
GTS platforma pro vyvojáře webexpo 2012Milan Petrásek
 
Gts produkty pro Business Continuity Mgmt.
Gts produkty pro Business Continuity Mgmt.Gts produkty pro Business Continuity Mgmt.
Gts produkty pro Business Continuity Mgmt.Milan Petrásek
 
Článek z CIO Business World
Článek z CIO Business WorldČlánek z CIO Business World
Článek z CIO Business WorldMilan Petrásek
 

More from Milan Petrásek (14)

O2 Firewally nové generace
O2 Firewally nové generaceO2 Firewally nové generace
O2 Firewally nové generace
 
What is botnet?
What is botnet?What is botnet?
What is botnet?
 
Bezpečná firma - koncepce GTS
Bezpečná firma - koncepce GTSBezpečná firma - koncepce GTS
Bezpečná firma - koncepce GTS
 
HighEnd a Mainframe procesory Itanium, SPARC, POWER
HighEnd a Mainframe procesory Itanium, SPARC, POWERHighEnd a Mainframe procesory Itanium, SPARC, POWER
HighEnd a Mainframe procesory Itanium, SPARC, POWER
 
DDoS ochrana pro setkání CSIRT.CZ
DDoS ochrana pro setkání CSIRT.CZDDoS ochrana pro setkání CSIRT.CZ
DDoS ochrana pro setkání CSIRT.CZ
 
DDoS
DDoSDDoS
DDoS
 
High Frequency Trading
High Frequency TradingHigh Frequency Trading
High Frequency Trading
 
Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity Management
 
GTS platforma pro vyvojáře webexpo 2012
GTS platforma pro vyvojáře webexpo 2012GTS platforma pro vyvojáře webexpo 2012
GTS platforma pro vyvojáře webexpo 2012
 
Cloudové služby GTS
Cloudové služby GTSCloudové služby GTS
Cloudové služby GTS
 
Gts produkty pro Business Continuity Mgmt.
Gts produkty pro Business Continuity Mgmt.Gts produkty pro Business Continuity Mgmt.
Gts produkty pro Business Continuity Mgmt.
 
Článek z CIO Business World
Článek z CIO Business WorldČlánek z CIO Business World
Článek z CIO Business World
 
GTS Data Storage CZ
GTS Data Storage CZGTS Data Storage CZ
GTS Data Storage CZ
 
TCO for a cloud
TCO for a cloudTCO for a cloud
TCO for a cloud
 

Unified Threat Management