Unified Threat Management
Unified Threat Management (UTM) is an approach to information security where a single hardware or software installation provides multiple security functions.
Key UTM related threats
- Unauthorized Access – Unauthorized access by users or devices, e.g. remote end points
- Unauthorized use of network protocols, services, applications and IPS
- Malicious code and malware attacks, including phishing
- Hacker reconnaissance, exploits and penetration
- Intrusion and Brute Force
- Denial of service (DOS) and Data interception
The Liquid Intelligent Technologies Solution
- Multi-tenant or dedicated options – Liquid owned MSSP
- Multi-tenant options – Cisco and Fortinet
- Dedicated options – Cisco, Fortinet, Palo Alto, Check Point
- Solution module options – Next Generation Firewall (NGFW), Next Generation IPS (NGIPS), Virtual Private Network (VPN), Secure Access Service Edge (SASE), Secure SD-WAN, Zero-Trust
- Consolidated Management and Reporting – Ease of management and relevant reporting to stakeholders
- Event Logging and Storage – Linked to requirements and service level agreements
- Monitoring and Analysis Service option – Monitoring and analysis linked to SLA
Benefits
- Options between self-owned or Liquid owned UTM instances
- Perimeter security controls provided through a single UTM device
- Very cost-effective monthly LIT support option for those doing management themselves
- Managed Security Service options to meet each customer requirements – Bronze, Silver, Gold
- More than one UTM vendor option
- Consolidated management, monitoring and reporting
- Options in terms of event logging and storage