Firewall/Unified Threat Management

Hits: 249

Unified threat management takes advantage of today’s full-featured firewalls to allow customers to cost-effectively block the most nefarious and costly threats to their network right at the gateway, before it ever enters their network.  This includes spam, malware, viruses, and giving business owners complete control over how employees access the Internet, websites and social media.

What Is a Unified Threat Management Solution?

Unified threat management (UTM) is an emerging trend in the network security market. UTM appliances have evolved from traditional firewall/VPN products into a solution with many additional capabilities, including:

  • Spam blocking
  • Gateway antivirus
  • Spyware prevention
  • Intrusion prevention
  • URL filtering

These are functions that previously had to be handled by multiple systems. UTM solutions also provide integrated management, monitoring, and logging capabilities to streamline deployment and maintenance.

Application Control

Today, new Internet and social media applications are a common source of vulnerabilities and attacks (ie: Facebook, Twitter, YouTube, Skype, WebEx, instant messaging, etc.).  IT pros are faced with the challenge of managing or controlling a vast array of web applications without hindering productivity.  Most application traffic is now web-based over port 80 or port 443.  Adding to this challenge, some applications also use evasive techniques like encryption or they jump around non-standard ports.  And to complicate matters, the distinction between “web site” and “web application” is tenuous at best.  No longer does a traditional firewall with only port and protocol numbers suffice; the firewall administrator needs to set granular controls by application.  The business needs to understand and control which applications employees use.

Application Control makes it simple to create and enforce acceptable use policies at your company.  With Application Control, you can selectively allow, block, or restrict access to applications based on a user’s department, job function, and time of day.  Once you establish your policy, Application Control allows you to see in real-time what’s being accessed on your network and by whom.  You can use this information to demonstrate compliance, evaluate employee need, and refine acceptable use policies.

Do I Really Need This?

Netgear, Linksys, D-Link or other consumer-grade, residential routers work great for home computer systems but do not offer enough security or functionality to fully protect a business network.  You need a business-class commercial firewall, such as WatchGuard, SonicWALL, or Cisco to keep bad guys out, and your data secure.  If your business needs a more secure firewall, 3Meet can set-up, install, and configure an integrated perimeter defense.  We’ll ensure your network’s availability and the security of your company’s resources by protecting the network infrastructure against attacks.

Firewall and Security Appliance Experience & Expertise

3Meet has worked with and supported nearly every major brand of firewall and security appliance, including: WatchGuard Firebox, WatchGuard XTM, WatchGuard SOHO, SonicWALL TZ, Barracuda, Cisco ASA, Cisco Pix, Linksys, D-Link, Netgear, NetScreen, Checkpoint, and Secure Computing.

3Meet has been providing firewall and UTM security solutions to our customers since 2001.

Contact us for more information or to discuss implementing a firewall/UTM security solutio.

Leave a Reply

Your email address will not be published. Required fields are marked *