Security Investigate

The Advantages of Multi-Core UTM: How to Break Through the Speed Barriers to Real-Time Comprehensive Threat Protection

Download now Free registration required

Executive Summary

Network communications no longer just rely on store and-forward applications like e-mail. It has now grown to include real-time collaboration tools, Web 2.0 applications, Instant Messenger (IM) and peer-to-peer applications, Voice over IP (VoIP), streaming media and telepresence conferencing. Any one of these applications can open your network to potential attack. The newest trend in firewall protection is Unified Threat Management (UTM). UTM not only guards against intrusion, but performs content filtering, data leakage protection, intrusion detection and anti-malware duties. Unlike multiple point solutions, UTM is easy to deploy, manage and update, thereby reducing complexity and overhead costs.

  • Format: PDF
  • Size: 361.98 KB