Experts tout unified threat management appliances as an ideal antimalware, intrusion prevention and content filtering firewall for midmarket companies. But doesn’t this counter the long-standing security practice of defense-in-depth? With a one vendor, platform, and management console, aren’t we talking about a dangerous single point of failure? When is UTM good enough? When should we [...]
Answer Question | May 8, 2009 7:01 PM
Defense in Depth, Intrusion detection, Midmarket security, Single Point of Failure, Unified Threat Management
blocking chatenabled.mail.google.com doesn’t seem to work anymore. please help!
Answer Question | August 19, 2010 1:55 AM
Firewalls, FortiGate, FortiGuard, Google Talk, IM security, Unified Threat Management, UTM
1) How To Block all unwanted web sites through the UTM and how to enable the firewall as per customer advice, 2) The 802.11 n WLAN having some problems, throughput is ok but consumer cannot access properly some times,intermittent problem occured during the access time ,(example cannot open the web page and very slow speed [...]
Answer Question | December 4, 2008 4:09 AM
Unified Threat Management, UTM, UTM and WLAN, WLAN
i have pix 515E firewall and cyber roam device which is using as a proxy.do i have to use proxy with pix firewall
Answer Question | December 30, 2009 11:00 AM
Cisco, Cisco PIX 515E, Cyberoam, Cyberroam proxy, Firewalls, PIX, Unified Threat Management
we have a utm firewall for using a internet processing to our clients,How to block the porn sites i.e is unwanted URLs,and how to configure the same in my utm firewalls.
Answer Question | November 29, 2008 5:00 AM
Firewall configuration, Firewalls, Unified Threat Management
I wish to know that, whether deployment of a single UTM box will do a better job then combination of both firewall & web security software in place together?
Answer Question | June 25, 2008 4:19 PM
Firewalls, Unified Threat Management, UTM, Web security