Unified Threat Management (UTM) is a concept that many people, including those who are interested in computers and those who work in the field, are unfamiliar with, although that will undoubtedly improve in the near future.

The next step in the development of the conventional firewall is a UTM system.

If we realize it or not, most of us have a firewall installed into the modem we use to link to our Internet Service Provider (ISP). Its main purpose is to keep outside traffic out of our local private space by blocking off “ports” that aren’t in use. Consider it a barrier between you and the internet, blocking someone or something from accessing your device. The issue is that we Like some information to come to our machine, such as email traffic and web traffic. To let the traffic we want in, we pierce a hole in the wall designated for that purpose. Ports are the names given to these holes. We are much better with a firewall than we are without one, but open ports do present possible weaknesses that ne’er do wells could exploit.

Unified Threat Management Devices merge the features of a firewall with that of an anti-virus solution. Ports are always open to allow us to get our work done, but any packet of traffic that passes through the UTM is intelligently screened for viruses, malware, spam, and inappropriate content. They also provide sophisticated intrusion detection and prevention systems.

UTM devices have recently begun to provide Data Loss Prevention services as well. DLP allows you to specify private data or intellectual property, and it would prohibit it from reaching the network without your permission. This can be applied to digital systems that keep an eye on items like credit card numbers to protect you from data and identity theft.

Due to the cost of purchasing and maintaining UTM devices (on top of the device’s cost, an annual fee is payable to maintain the filtering definitions, similar to the subscription payment on your anti-virus software), the primary market for UTM devices has been the small to medium size Enterprise sector, although providers have recently started developing solutions for the SOHO (Small Office/Home Office) market.

Although UTM devices offer a significant increase in computer security, they are not recommended as a substitute for conventional anti-virus software, but rather as an extension to it. Only external risks are covered by UTMs, and only traffic in transit is scanned. You’ll need antivirus protection if your son, daughter, or significant other takes home a virus-infected movie on a thumb drive and plugs it in.

Leave a Comment