|
Unified threat management (UTM) or unified security management (USM), is a solution in the network security industry, and since 2004 it has become established as a primary network gateway defense solution for organizations.〔IDC. September 2007. ''Unified Threat Management Appliances and Identity-based Security: The Next Level in Network Security''. IDC Go-to Market Services.〕 In theory, UTM is the evolution of the traditional firewall into an all-inclusive security product able to perform multiple security functions within one single system: network firewalling, network intrusion prevention and gateway antivirus (AV), gateway anti-spam, VPN, content filtering, load balancing, data loss prevention and on-appliance reporting. The worldwide UTM market was approximately worth $1.2 billion in 2007, with a forecast of 35-40% compounded annual growth rate through 2011. The primary market of UTM providers is the SMB and enterprise segments, although a few providers are now providing UTM solutions for small offices/remote offices.〔Firstbrook, Peter, Orans, Lawrence & Hallawell, Arabella. 4 June 2007. ''Magic Quadrant for Secure Web Gateway'', 2007. Gartner Inc. 1-28〕 The term UTM was originally coined by market research firm IDC. The advantages of unified security lie in the fact that rather than administering multiple systems that individually handle antivirus, content filtering, intrusion prevention and spam filtering functions, organizations now have the flexibility to deploy a single UTM appliance that takes over all their functionality into a single rack mountable network appliance. ==History== UTM solutions emerged of the need to stem the increasing number of attacks on corporate information systems via hacking/cracking, viruses, worms - mostly an outcome of blended threats and insider threats. Also, newer attack techniques target the user as the weakest link in an enterprise, the repercussions of which are far more serious than imagined. Data security and unauthorized employee access have become major business concerns for enterprises today. This is because malicious intent and the resultant loss of confidential data can lead to huge financial losses as well as corresponding legal liabilities. It needs to be mentioned that enterprises have only now begun to recognize the fact that user ignorance can lead to security being compromised out of their internal networks.〔Mittal, Richa. Dec 19, 2008. Unified Threat Management and Identity-based Security. Knol Articles. http://knol.google.com/k/richa-mittal/unified-threat-management-and-identity/1jdphe4wksldn/5#. Accessed May 7, 2009〕 The main advantages of UTM solutions are simplicity, streamlined installation and use, and the ability to update all the security functions concurrently.〔Author Unknown. 2009. ''Definitions –Unified Threat Management''. Search Security (Tech Target). http://searchsecurity.techtarget.com/dictionary/definition/what-is-unified-threat-management.html. (accessed May 7, 2009)〕 The goal of a UTM is to provide a comprehensive set of security features in a single product managed through a single console. Integrated security solutions evolved as a logical way to tackle the increasingly complex blended internet threats impacting organizations.〔Biztech. 2008. SMBs Driving the Indian UTM Market. Biztech India. http://tech2.in.com/biz/india/features/security/smbs-driving-the-indian-utm-market/19851/0 (accessed May 7, 2009)〕 The UTM market has shown notable growth recently with a 20.1% increase in 2009 following up a 32.2% increase in 2008, according to Frost and Sullivan. 抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)』 ■ウィキペディアで「Unified threat management」の詳細全文を読む スポンサード リンク
|