From the course: Certified Information Security Manager (CISM) Cert Prep (2022): 3 Information Security Program
Unlock the full course today
Join today to access over 24,200 courses taught by industry experts.
Unified threat management
From the course: Certified Information Security Manager (CISM) Cert Prep (2022): 3 Information Security Program
Unified threat management
- [Narrator] We've talked about a lot of different security devices in this course. And one of the major issues associated with them is that purchasing all of these devices can be very expensive. Particularly for a small or mid-sized organization. Unified threat management or UTM solutions try to solve this problem by combining many different security functions on a single device. UTM products start by performing the basic functions of a firewall and router. Protecting the network against many attacks, blocking unsolicited traffic, and routing traffic to and from the internet. Then they add some of the security features that we've discussed already in this course, including VPN connectivity, intrusion detection, and intrusion prevention. UTM products also often include other features useful to small businesses that might not be found in enterprise security devices. For example, they often perform both URL filtering to…
Contents
-
-
-
-
-
-
-
-
-
-
Routers, switches, and bridges3m 6s
-
(Locked)
Firewalls6m 7s
-
(Locked)
VPNs and VPN concentrators4m 29s
-
(Locked)
Network intrusion detection and prevention5m 1s
-
(Locked)
Unified threat management1m 57s
-
(Locked)
VLANs and network segmentation1m 36s
-
(Locked)
Network access control4m 30s
-
(Locked)
Remote network access4m 59s
-
-
-
-
-
-