The Dirty Secret Behind the UTM: What Security Vendors Don't Want You to Know

Free registration required

Executive Summary

Until the late 1990s, network security threats were predominantly written by programmers seeking notoriety, or those who just wanted to test their skills and have some fun, at the expense of other computer users. As a result, early threats were limited in scope and capabilities, and were easily thwarted using a combination of anti-virus software and Stateful Packet Inspection (SPI) firewalls. To effectively combat these threats, most enterprises employ a robust, multi-layered security solution that includes protection against a wide range of Web and email attacks. Such a layered defense strategy requires complex systems to effectively secure all of the firm's network assets, as well as the ability to stay abreast of the company's network traffic to determine if there are any unusual traffic patterns.

  • Format: PDF
  • Size: 696.4 KB