Monday, 28 February 2011
Unified Threat Management systems (UTM) – Single user UTMs vs Multi User UTM’s
Do you like this story?
In my last post, i blogged about UTM’s which got a fairly positive response over mail :) . UTMs can be simply expressed as Next generation Firewalls, have evolved specifically from conventional firewalls. The first firewalls were software firewalls which were itself evolved from software routers.
Later on as technology evolved, and hardware routers came into scene, hardware firewalls arrived which were nothing more than routers with packet filtering capabilities. Furthermore, the technology matured from basic packet filtering to a more complex control technology which included stateful packet inspection and finally to full application layer inspection devices (IEEE, 1997). Around the year 2000, VPN’s appeared and gained acceptance as the mainstream technology to connect networks securely, remotely. Firewalls followed closely by integrating VPN’s with Firewall which was the natural choice as enterprise solutions required both firewalls and VPNS.
As the prices for bandwidth fell along with the cost of cryptographic hardware needed to encode and decode the traffic, the need for specialized hardware rose which may be used to accelerate the performance.
Unified Threat Management
In mid 2004, International Data Corporation (IDC) defined UTM platforms as to minimally include firewall, VPN, intrusion prevention and antivirus features. Touted as “Next Generation Firewalls”, we have two approaches to design the UTM’s since their inception.
- Licensing and Integrating Approach (Multi vendor UTM)
- In-house Development Approach (Single vendor UTM)
The above figure illustrates the core architecture and development approach of developing UTMs
Licensing and Integrating Approach (Multi vendor UTM)
The first design approach tried to get the best of worlds by integrating specialized technologies from different security vendors. For e.g.:
Cyberoam UTM licenses Antivirus from Kaspersky, AntiSpam by Commtouch , both who specialize in Antivirus and AntiSpam technologies.
These UTM’s provided an integrated interface to manage all the integrated technologies in the easiest possible manner, while some others require specific management interfaces.
Advantages | Limitations |
|
|
|
|
|
|
|
|
|
|
|
|
In-house Development Approach (Single vendor UTM)
Advantages | Limitations |
|
|
|
|
|
|
|
|
| |
|
In my next article I will be discussing more about UTMs. Please add your points so I can make it better.
Stay tuned.
This post was written by: Rishabh Dangwal
Rishabh Dangwal is a no-nonsense network geek who likes to play retro games and emulators in free time. Follow him on Twitter
0 Responses to “Unified Threat Management systems (UTM) – Single user UTMs vs Multi User UTM’s”
Post a Comment