From the course: Certified Information Security Manager (CISM) Cert Prep (2022): 3 Information Security Program

Unlock the full course today

Join today to access over 24,200 courses taught by industry experts.

Unified threat management

Unified threat management

- [Narrator] We've talked about a lot of different security devices in this course. And one of the major issues associated with them is that purchasing all of these devices can be very expensive. Particularly for a small or mid-sized organization. Unified threat management or UTM solutions try to solve this problem by combining many different security functions on a single device. UTM products start by performing the basic functions of a firewall and router. Protecting the network against many attacks, blocking unsolicited traffic, and routing traffic to and from the internet. Then they add some of the security features that we've discussed already in this course, including VPN connectivity, intrusion detection, and intrusion prevention. UTM products also often include other features useful to small businesses that might not be found in enterprise security devices. For example, they often perform both URL filtering to…

Contents