Unified Threat Management Basic Tutorial | UTM's single user and Multi user explored
In my last post, i blogged about UTMs which got a fairly positive response over mail :) . UTMs can be simply expressed as Next generation Firewalls, have evolved specifically from conventional firewalls. The first firewalls were software firewalls which were itself evolved from software routers.
Later on as technology evolved, and hardware routers came into scene, hardware firewalls arrived which were nothing more than routers with packet filtering capabilities. Furthermore, the technology matured from basic packet filtering to a more complex control technology which included stateful packet inspection and finally to full application layer inspection devices (IEEE, 1997). Around the year 2000, VPNs appeared and gained acceptance as the mainstream technology to connect networks securely, remotely. Firewalls followed closely by integrating VPNs with Firewall which was the natural choice as enterprise solutions required both firewalls and VPNS.
As the prices for bandwidth fell along with the cost of cryptographic hardware needed to encode and decode the traffic, the need for specialized hardware rose which may be used to accelerate the performance.
Unified Threat Management
In mid 2004, International Data Corporation (IDC) defined UTM platforms as to minimally include firewall, VPN, intrusion prevention and antivirus features. Touted as Next Generation Firewalls, we have two approaches to design the UTMs since their inception.
In-house Development Approach (Single vendor UTM)
In my next article I will be discussing more about UTMs. Please add your points so I can make it better.
- Licensing and Integrating Approach (Multi vendor UTM)
- In-house Development Approach (Single vendor UTM)
The above figure illustrates the core architecture and development approach of developing UTMs
Licensing and Integrating Approach (Multi vendor UTM)
The first design approach tried to get the best of worlds by integrating specialized technologies from different security vendors. For e.g.:
Cyberoam UTM licenses Antivirus from Kaspersky, AntiSpam by Commtouch , both who specialize in Antivirus and AntiSpam technologies.These UTMs provided an integrated interface to manage all the integrated technologies in the easiest possible manner, while some others require specific management interfaces.
Advantages | Limitations |
|
|
|
|
|
|
|
|
| |
|
The second design approach is the more difficult out of two, which requires ground up development of a UTM device from scratch, and involves the provision of each security function natively. This was not flawless, each security function must pass a set of market guidelines and standards set by standalone security products effectively in order to be accepted. However, with time, the core functions provided by UTM platformsfirewall, intrusion prevention and antivirushad matured since the onset of the UTM era, so building competent security functions was both possible and cost effective. Also, this approach had a better management interface as the platform incorporated all the technologies since inception.
Advantages | Limitations |
|
|
|
|
|
|
|
|
| |
|
Unified Threat Management Basic Tutorial | UTM's single user and Multi user explored
3 Visitor Reactions & Comments:
Post a Comment