Unified threat management (UTM) is an approach to security management that allows an administrator to monitor and manage a wide variety of security-related applications and infrastructure components through a single management console.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
UTMs, which are typically purchased as cloud services or network appliances, provide firewall, intrusion detection, antimalware, spam and content filtering and VPN capabilities in one integrated package that can be installed and updated easily. UTMs for enterprise customers may also include more advanced features such as identity-based access control, load balancing, quality of service (QoS), intrusion prevention, SSL and SSH inspection and application awareness.
The principal advantage of a UTM product is its ability to reduce complexity. The principal disadvantage is that a UTM appliance can become a single point of failure (SPOF).
UTM appliances are sometimes referred to as next-generation firewalls.
See also: single pane of glass
Continue Reading About unified threat management (UTM)
- Unifiedthreatmanagement.com outlines the basics of UTM, and provides links to vendors and related information.
- David Strom explains 'How to set up a managed unified threat management remote firewall/VPN appliance.'