Brief introduction
Unified threat management (Unified Threat Management), referred to UTM.
In September 2004, IDC first proposed the concept of "unified threat management", is about anti-virus, intrusion detection and firewall security devices placed under the unified threat management (Unified Threat Management) new category.
UTM is based on the development of the firewall up, with firewall, IPS, anti-virus, anti-spam and other integrated functions, the simultaneous turn feature will greatly reduce the number of processing performance UTM, and therefore mainly used for low performance requirements in end of the field. In the high-end applications, such as telecommunications, finance and other industries, still dedicated high-performance firewall, IPS mainstream.
Two deployment modes
At the network boundary, in addition to the firewall functionality can also be played IDS, IPS, VPN, traffic control, authentication, and application-layer protection. When deployed UTM, you can not deploy a firewall.
Routing mode
Logical isolation
Transparent mode
It acts as a security gateway or security products.
Features
UTM set a variety of security functions in one, a simple one-click configuration management and ongoing security services, constitute a standard unified security platform. Integrated stateful inspection firewall, VPN, gateway antivirus, intrusion prevention (IPS), green line, anti-spam and other security functions, but also full support for policy management, IM / P2P management, quality of service (QoS), load balancing, high availability (HA) and bandwidth management functions. You can block unauthorized access, network intrusion, viruses, worms, Trojans, spyware, phishing, spam, and other types of security threats.