An introduction to
Unified Threat
Management (UTM)
http://bit.ly/CARMcloud
The Security Challenge
• Today’s networking environment and threat
landscape are changing constantly — new
devices, applications, and threats appear
almost daily
• Organizations of all sizes struggle to enable
secure access for users on the latest mobile
devices while blocking the latest threats
hidden inside application traffic from social
media sites. It’s a tough fight!
http://bit.ly/CARMcloud
The need for Consolidated
Network Security
• In today’s increasingly mobile world, networks change
constantly. New services, access methods, and even devices
continue to show up in networks at a frenetic pace
• As a result, organizations of all sizes face challenges in
maintaining control over network and security policies
• Unfortunately, many organizations continue to take a
traditional approach to network security in spite of
changing software, devices, and user habits. Such a
traditional approach cannot adapt to the latest trends and
leaves organizations vulnerable to today’s threats
• To keep up with the constant change, organizations of all
sizes must adopt a different approach
http://bit.ly/CARMcloud
The Good
More and Better Network Access
• The evolution and incredible proliferation of networking and
security technology has produced many benefits:
– Today, remote users can access corporate data inside a firewall using
any device with a network connection
– Every day, the number of applications is exploding; exploiting the
internet’s speed and always-on access makes it trivial to deliver
content to end-users
– Today’s applications deliver better access to back-end and internal
data resources, which has enabled tremendous leaps in productivity
among employees, partners, vendors, and customers
– Delivery models have also evolved, from traditional ‘on premise’
applications inside a network, towards cloud-based hosted application
services
– The growing use of social media in everyday business practices reflects
a profound change in where and how potential customers, partners,
and agencies gather data, influence buying decisions, and build brand
awareness
http://bit.ly/CARMcloud
The Good
What’s the impact?
• A lot of good things have happened on corporate
networks, and a lot of those things involve new
technologies and new uses for existing systems
and information assets
• But these changes also add to the burden of
maintaining security and require forward thinking
to ensure that levels of protection and security
keep up with new uses, new forms of access, and
new forms of communication
http://bit.ly/CARMcloud
The Bad
• The ongoing application explosion means that
new apps show up and run on systems and
devices on organizational networks every day
• Too often, such applications fly under the radar of
network administrators and appear without
planning, proper licensing, or even informed
consent
• Worse, such applications can potentially inundate
those networks on which they appear with
unknown, questionable, or even outright
malicious content
http://bit.ly/CARMcloud
Why is this an issue?
• Traditional firewalls cannot detect these new applications; they
rely on port numbers or protocol identifiers to recognize and
categorize network traffic and to enforce policies related to such
traffic
• Apps that use specific port numbers or protocols make it easy
for network administrators to block unwanted traffic, but
browser-based applications often use only two port numbers,
each associated with a protocol vital to user productivity and
responsible for the bulk of Internet traffic today
• This means that all traffic from browser-based apps looks exactly
the same to traditional firewalls; they can’t differentiate
between applications, so there is no easy way to block bad,
unwanted, or inappropriate programs whilst permitting
desirable or necessary apps to proceed unhindered
http://bit.ly/CARMcloud
Examples of the impact
• Exposure to malicious content
– User-created content encompasses a wide range of threats, such as malware
or links to malicious sites that could compromise user systems or even entire
networks
– Common risks include links to malicious sites where visitors are subject to
drive-by downloads
• Unwanted bandwidth consumption
– Bandwidth-intensive web-based applications such as YouTube can clog
networks and impede delivery of business-critical content
– File-sharing applications can bog down networks because of large file sizes
and the sheer number of files being swapped
• Exposure to data leakage
– Apps that can accommodate outbound file attachments can permit employees
to (perhaps unwittingly) export sensitive, confidential or protected
information outside organizational boundaries and controls
– This can incur potential civil and criminal liabilities, as well as loss of customer
trust and brand equity
http://bit.ly/CARMcloud
And The Ugly
• Online crime is an ever-increasing part of the
threat landscape. Beyond the threats of damage
or data loss from malware, professional criminals
have gone online to ply their unsavoury trades
• Corporations, institutions, government agencies,
and other large organizations can fall prey to
various kinds of cyberwarfare, that aim to steal
information, transfer funds, or perform other
illicit activities
http://bit.ly/CARMcloud
Botnets
• One of the ugliest elements of this side of the online universe is botnets
• A bot is an individual computer that has been compromised with malware
that takes instructions from a criminal. Each such computer is called a bot
and collections of such computers are called botnets
• Some common forms of attack include:
– Phishing-based attack – credentials are stolen or additional victims claimed.
Phishing can open the door to network penetration and compromise
– Search Engine Optimization (SEO) attack – gaming search engines to include
malicious sites high in page rankings. Victims search for a popular term and land on
the malicious site unknowingly. This can also open the door to network penetration
and compromise
– Compromised legitimate websites - this can happen in various ways without
detection by the site operator. For example, ads being served by a third party that
redirect visitors to malicious sites, injecting malicious code into the site itself, or
replacing legitimate HTML code with code that contains malware
– Internal infections - this is often achieved by using an auto-run function, once the
device is introduced to a network. However, some botnets can infect legitimate
files on mobile devices that are executed on-demand by victims
http://bit.ly/CARMcloud
Traditional firewalls can’t keep
up with today’s threats
• Because network traffic is so heavily web- and application-
based, the ability of legacy security technologies to protect
internal networks is increasingly challenged, to say the least
• Attacks have become more frequent and more serious. Every
day new attacks are designed to avoid detection and come up
with more and better ways to steal our information
• As attacks and their consequences become more dangerous and
costly, organizations are learning to their dismay that their
existing security infrastructures can’t keep up
• Traditional firewalls and security appliances have lost their
ability to block such traffic, which means prevailing tools and
technologies can’t prevent the worst and most nefarious attacks
from affecting or damaging networks
http://bit.ly/CARMcloud
Inadequate Protection (at Best)
• One of the first and most basic lines of network defence is a firewall, a
device that inspects inbound and out-bound traffic on a network
• Firewalls were the first widely deployed network security technology
when internet use really began in earnest. The firewall’s job is to inspect
traffic and decide what is allowed to go from outside to inside, and from
inside to outside
• But network traffic has changed vastly in the last decade, and a great
proportion is now web-based
• Because of the commingling of modern application traffic with everyday
web access, traditional port-based firewalls have essentially become blind
to the most common type of network traffic
• This means:
– They cannot distinguish different types of traffic that use the same
port
– They cannot detect applications that tunnel inside other applications
– They cannot see inside encrypted packets
– They can’t even block sneaky rogue applications that use nonstandard
port numbers
http://bit.ly/CARMcloud
Evolving firewall technology still
can’t keep up
• As simple rules for filtering traffic in a firewall proved to be too permissive,
firewall vendors deployed new technology to stay abreast of the changing
threat landscape
• One important advance was the development of a proxy server, which sits
transparently on the network and checks all packets for policy compliance
before forwarding them
• Various other security protocols were also developed to distinguish legitimate
communications from suspicious or malicious types of connections, allowing
only packets that corresponded to a valid, recognized, active connection
between a client and server and rejecting everything else
• In spite of these advances, firewalls could not stop the evolving threats. With
each new firewall technology, the hackers devised new evasion techniques.
New threats simply slipped through legacy firewalls and headed right onto the
trusted network, attacking clients and servers with gusto and abandon
• Network security vendors sought to fight back by creating new technologies to
fight the new threats
http://bit.ly/CARMcloud
From Firewalls to Stand-alone
Products
• Over time, as the threat landscape evolved, organizations began adding
specialized or stand-alone security devices to their infrastructures, with the
intention of providing workarounds to the limitations of traditional firewalls
• Each device addresses a specific threat: One appliance provides malware
screening, and another provides content filtering of websites and traffic. Still
others detect and block intrusions, or add spam filtering and e-mail message
handling. Put them all together on a network, and you could have half a dozen
or more appliances, each inspecting the stream of traffic moving across the
network
• All of these devices were designed to improve a network’s security by adding
functionality missing from the firewall. However, a patchwork of stand-alone
technologies can have the opposite effect on network visibility as well as
performance. They don’t talk to each other easily (if at all). They lack central
management and monitoring because each product operates on its own. Plus,
data from individual devices isn’t aggregated to create a complete or holistic
view
http://bit.ly/CARMcloud
Examples of Stand-alone
Security Appliances
Here are some examples of typical stand-alone security appliances that
are deployed in a network:
• Virtual private network (VPN): Uses special protocols to move
information across the Internet securely
• Data loss prevention (DLP): Looks for confidential, proprietary, or
regulated data leaving the network. It can stop wholesale loss of
proprietary data, as well as small scale accidental losses
• Intrusion prevention system (IPS): Acts as a network’s watchdog,
looking for patterns of network traffic and activity, and recording
events that may affect security
• Content filtering technologies: These devices block traffic to and/or
from a network by IP address, domain name/URL, type of content
or payload
http://bit.ly/CARMcloud
The reality of using Stand-
alone security appliances
• There are several implications of the use of stand-
alone security appliances, namely:
– Multiple devices create a performance hit
– Reduced network visibility
– Total Cost of Ownership is far too high
• The benefits of moving away from this approach
include:
– An integrated and holistic view of network security
– Optimal TCO
– Minimal latency impact
http://bit.ly/CARMcloud
Finding a way out…
• Many organizations want to find a way out of the
expensive, labour-intensive, unsecure, and chaotic mess of
traditional firewalls supplemented with multiple stand-
alone security technologies
• Unified Threat Management (UTM) is the approach that
many organizations have adopted to improve visibility and
control of their network security while lowering complexity
of their networks
• UTM creates an environment in which all network security
falls beneath a single, consistent technology umbrella
• UTM enables the consolidation of all traditional as well as
next-generation firewalls into a single device
http://bit.ly/CARMcloud
Stepping up to UTM
• UTM represents a significant shift in the evolution of network
security technology and equipment
• UTM generally refers to a security appliance that consolidates a
wide range of essential network security functions into a single
device, including next-generation firewall technologies like
application control
• As network threats evolve and new threats emerge, network
security must change and adapt to protect against such threats.
This adaptability can make UTM difficult to define because the
technologies included can vary from vendor to vendor
• Over time, however, the collection of capabilities associated
with UTM has consistently expanded, and this trend shows no
sign of tapering off
http://bit.ly/CARMcloud
UTM – bringing order to chaos
The best UTM solutions include the following core security
functions:
• Network firewalls perform stateful packet inspection
• IPS detects and blocks intrusions and certain attacks
• Application control provides visibility and control of application
behaviour and content
• VPN enables secure remote access to networks
• Web filtering halts access to malicious, inappropriate, or
questionable websites and online content
• IPv6 support in all network security functions protects networks as
they migrate from IPv4 to IPv6
• Support for virtualized environments, both virtual domains and
virtual appliances
http://bit.ly/CARMcloud
Additional technologies
UTM solutions may also include additional security
technologies that organizations can choose to deploy,
including:
• Data loss prevention that blocks accidental or intentional loss
of confidential, proprietary, or regulated data
• Anti-malware/anti-spam protection that prevents malicious
payloads or unwanted messages from entering networks
• Endpoint control that enforces corporate security policies
with remote users and devices
http://bit.ly/CARMcloud
Flexible, Future-Ready and
Powerful
• UTM delivers a flexible, future-ready solution to meet the
challenges of today’s networking environments
• Not every organization is going to deploy every technology included
in a UTM device; in fact, most do not, but a UTM gives an
organization the ability to deploy as many or as few technologies as
it needs, when and where it needs them
• The best UTM solutions employ a simple licensing model that
includes all technologies, eliminating the need to purchase
additional modules or to count users as an organization’s security
requirements change over time
• UTM delivers a versatile, powerful solution to meet the challenges
of today’s most complex networking environment. It overcomes
shortcomings of non-integrated, legacy systems built around
traditional firewalls and individual, stand-alone appliances and
software
http://bit.ly/CARMcloud
UTM – Significant Advantage
• One significant advantage UTM devices have over
legacy firewalls (combined with multiple appliances), is
integrated management. The “single pane of glass”
management console of UTM provides a consolidated
management interface with ready access to all
configurations, management, and monitoring functions
• This is especially useful when it comes to seeing and
reacting to combinations of events that represent a
sophisticated attack. This reduces the likelihood of
common failings from traditional systems, including
failure to notice an incident or event, failure to act in a
timely fashion, and failure to maintain compliance and
audit controls
http://bit.ly/CARMcloud
UTM – Other Business
Advantages
There are many other significant advantages to
UTM, namely:
• Cost effectiveness – driven by consolidation of
network and security management
• Improved awareness
• Reduced ‘false sense of security’
• Accelerated processing speeds-up business
• Ability to keep pace with the changing threat
landscape
http://bit.ly/CARMcloud
UTM delivers a flexible, future-
ready solution to meet the
challenges of today’s networking
environments.
For a more detail on all of the
topics covered in this summary,
please download our free e-
book:
Unified Threat Management for
Dummies
http://bit.ly/CARMcloud
Thank-you

More Related Content

PPTX
UTM (unified threat management)
PPT
UTM Unified Threat Management
PPTX
unified threat management by Nisha Menon K
PPT
Sophos Utm Presentation 2016
PDF
Utm (unified threat management) security solutions
PPT
Network security
PDF
Preparing Your School for BYOD with Sophos UTM Wireless Protection
PPT
Android Firewall project
UTM (unified threat management)
UTM Unified Threat Management
unified threat management by Nisha Menon K
Sophos Utm Presentation 2016
Utm (unified threat management) security solutions
Network security
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Android Firewall project

What's hot (20)

PPT
Next generation firewall(ngfw)feature and benefits
PPTX
Sophos Next-Generation Enduser Protection
PPTX
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
PPTX
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
PPTX
The next generation of IT security
PPTX
What's cooking at Sophos - an introduction to Synchronized Security
PDF
Firewalls
PDF
E firewalls
PPTX
Sangfor ngfw 修订版
PPTX
Security: more important than ever - Sophos Day Belux 2014
PPTX
Cyberoam Firewall Presentation
PPTX
Firewall presentation
PPTX
Network security and firewalls
PPT
Lecture 4 firewalls
PPT
Firewalls
PPT
PDF
Supply Chain Attack Backdooring Your Networks
PPTX
Firewalls
PPTX
Introduction of firewall slides
PPT
Next generation firewall(ngfw)feature and benefits
Sophos Next-Generation Enduser Protection
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
The next generation of IT security
What's cooking at Sophos - an introduction to Synchronized Security
Firewalls
E firewalls
Sangfor ngfw 修订版
Security: more important than ever - Sophos Day Belux 2014
Cyberoam Firewall Presentation
Firewall presentation
Network security and firewalls
Lecture 4 firewalls
Firewalls
Supply Chain Attack Backdooring Your Networks
Firewalls
Introduction of firewall slides
Ad

Viewers also liked (15)

PDF
Unified Threat Management
PPTX
Firewall presentation
PDF
Chap11 scr
PPTX
How to join the twitter chat with Druva
PPTX
Smarter social enterprise
PDF
Exclusive Group is Recruiting!
PPTX
Unified Threat Management Solutions
PDF
Információbiztonság: IT biztonságtechnikai közbeszerzések
PDF
Belsoegesű motorok általános
PPTX
Young Enterprise Day 2014 – Palo Alto Networks: az újgenerációs tűzfal
PDF
Watchguard Firewall overview and implemetation
PDF
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
PDF
Overview of Linux
PDF
Firewall fundamentals
Unified Threat Management
Firewall presentation
Chap11 scr
How to join the twitter chat with Druva
Smarter social enterprise
Exclusive Group is Recruiting!
Unified Threat Management Solutions
Információbiztonság: IT biztonságtechnikai közbeszerzések
Belsoegesű motorok általános
Young Enterprise Day 2014 – Palo Alto Networks: az újgenerációs tűzfal
Watchguard Firewall overview and implemetation
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Overview of Linux
Firewall fundamentals
Ad

Similar to An introduction to Unified Threat Management (UTM), for Dummies (20)

PPTX
UTM Technology & Leaders of UTMs in Gartner Magic report 2014
PPTX
M1_Introduction_IPS.pptx
PDF
Welcome to International Journal of Engineering Research and Development (IJERD)
PDF
FORTINET_WP-WEBFILTERING-201106.pdf
PDF
Firewall buyers-guide
PDF
Healthcare_Security_White_Paper
PPTX
chapter1 Introduction to Software Security.pptx
PPTX
Security and control in Management Information System
DOCX
Seguridad web -articulo completo- ingles
PPTX
Cyber Security awareness of cyber security
PDF
Anti spyware coalition definitions and supporting documents
PPTX
What is Cyber & information security.pptx
PPTX
Cyber security by Gaurav Singh
PDF
Toward Continuous Cybersecurity With Network Automation
PDF
Toward Continuous Cybersecurity with Network Automation
PDF
Detection of Spreading Process on many assets over the network
PDF
SECURING THE WEB DOMAIN BASED ON HASHING
PPTX
Introduction to Cyber-Security beginners.pptx
PDF
Ethics in Information Technology - An Overview
PDF
Insights into cyber security and risk
 
UTM Technology & Leaders of UTMs in Gartner Magic report 2014
M1_Introduction_IPS.pptx
Welcome to International Journal of Engineering Research and Development (IJERD)
FORTINET_WP-WEBFILTERING-201106.pdf
Firewall buyers-guide
Healthcare_Security_White_Paper
chapter1 Introduction to Software Security.pptx
Security and control in Management Information System
Seguridad web -articulo completo- ingles
Cyber Security awareness of cyber security
Anti spyware coalition definitions and supporting documents
What is Cyber & information security.pptx
Cyber security by Gaurav Singh
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity with Network Automation
Detection of Spreading Process on many assets over the network
SECURING THE WEB DOMAIN BASED ON HASHING
Introduction to Cyber-Security beginners.pptx
Ethics in Information Technology - An Overview
Insights into cyber security and risk
 

More from Elsa Cariello (6)

PDF
Exclusive Group Love Campaign Infographic
PDF
Exclusive Group and Palo Alto and the Unbreakable Bond
PDF
Why Exclusive Group and Fortinet are a solid "partnership".
PPTX
How to join a Twitter Chat from Exclusive Networks Group
PPTX
Carm presentation new logo may 14
PDF
Infographic on why you need CARM when’a cyber breach take place.
Exclusive Group Love Campaign Infographic
Exclusive Group and Palo Alto and the Unbreakable Bond
Why Exclusive Group and Fortinet are a solid "partnership".
How to join a Twitter Chat from Exclusive Networks Group
Carm presentation new logo may 14
Infographic on why you need CARM when’a cyber breach take place.

Recently uploaded (20)

PPTX
Configure Apache Mutual Authentication
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPTX
The various Industrial Revolutions .pptx
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PPTX
Benefits of Physical activity for teenagers.pptx
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
STKI Israel Market Study 2025 version august
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PPTX
Build Your First AI Agent with UiPath.pptx
Configure Apache Mutual Authentication
The influence of sentiment analysis in enhancing early warning system model f...
OpenACC and Open Hackathons Monthly Highlights July 2025
Developing a website for English-speaking practice to English as a foreign la...
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
Taming the Chaos: How to Turn Unstructured Data into Decisions
The various Industrial Revolutions .pptx
1 - Historical Antecedents, Social Consideration.pdf
A review of recent deep learning applications in wood surface defect identifi...
sbt 2.0: go big (Scala Days 2025 edition)
Benefits of Physical activity for teenagers.pptx
Microsoft Excel 365/2024 Beginner's training
Improvisation in detection of pomegranate leaf disease using transfer learni...
Final SEM Unit 1 for mit wpu at pune .pptx
STKI Israel Market Study 2025 version august
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Custom Battery Pack Design Considerations for Performance and Safety
A contest of sentiment analysis: k-nearest neighbor versus neural network
Enhancing plagiarism detection using data pre-processing and machine learning...
Build Your First AI Agent with UiPath.pptx

An introduction to Unified Threat Management (UTM), for Dummies

  • 1. An introduction to Unified Threat Management (UTM) http://bit.ly/CARMcloud
  • 2. The Security Challenge • Today’s networking environment and threat landscape are changing constantly — new devices, applications, and threats appear almost daily • Organizations of all sizes struggle to enable secure access for users on the latest mobile devices while blocking the latest threats hidden inside application traffic from social media sites. It’s a tough fight! http://bit.ly/CARMcloud
  • 3. The need for Consolidated Network Security • In today’s increasingly mobile world, networks change constantly. New services, access methods, and even devices continue to show up in networks at a frenetic pace • As a result, organizations of all sizes face challenges in maintaining control over network and security policies • Unfortunately, many organizations continue to take a traditional approach to network security in spite of changing software, devices, and user habits. Such a traditional approach cannot adapt to the latest trends and leaves organizations vulnerable to today’s threats • To keep up with the constant change, organizations of all sizes must adopt a different approach http://bit.ly/CARMcloud
  • 4. The Good More and Better Network Access • The evolution and incredible proliferation of networking and security technology has produced many benefits: – Today, remote users can access corporate data inside a firewall using any device with a network connection – Every day, the number of applications is exploding; exploiting the internet’s speed and always-on access makes it trivial to deliver content to end-users – Today’s applications deliver better access to back-end and internal data resources, which has enabled tremendous leaps in productivity among employees, partners, vendors, and customers – Delivery models have also evolved, from traditional ‘on premise’ applications inside a network, towards cloud-based hosted application services – The growing use of social media in everyday business practices reflects a profound change in where and how potential customers, partners, and agencies gather data, influence buying decisions, and build brand awareness http://bit.ly/CARMcloud
  • 5. The Good What’s the impact? • A lot of good things have happened on corporate networks, and a lot of those things involve new technologies and new uses for existing systems and information assets • But these changes also add to the burden of maintaining security and require forward thinking to ensure that levels of protection and security keep up with new uses, new forms of access, and new forms of communication http://bit.ly/CARMcloud
  • 6. The Bad • The ongoing application explosion means that new apps show up and run on systems and devices on organizational networks every day • Too often, such applications fly under the radar of network administrators and appear without planning, proper licensing, or even informed consent • Worse, such applications can potentially inundate those networks on which they appear with unknown, questionable, or even outright malicious content http://bit.ly/CARMcloud
  • 7. Why is this an issue? • Traditional firewalls cannot detect these new applications; they rely on port numbers or protocol identifiers to recognize and categorize network traffic and to enforce policies related to such traffic • Apps that use specific port numbers or protocols make it easy for network administrators to block unwanted traffic, but browser-based applications often use only two port numbers, each associated with a protocol vital to user productivity and responsible for the bulk of Internet traffic today • This means that all traffic from browser-based apps looks exactly the same to traditional firewalls; they can’t differentiate between applications, so there is no easy way to block bad, unwanted, or inappropriate programs whilst permitting desirable or necessary apps to proceed unhindered http://bit.ly/CARMcloud
  • 8. Examples of the impact • Exposure to malicious content – User-created content encompasses a wide range of threats, such as malware or links to malicious sites that could compromise user systems or even entire networks – Common risks include links to malicious sites where visitors are subject to drive-by downloads • Unwanted bandwidth consumption – Bandwidth-intensive web-based applications such as YouTube can clog networks and impede delivery of business-critical content – File-sharing applications can bog down networks because of large file sizes and the sheer number of files being swapped • Exposure to data leakage – Apps that can accommodate outbound file attachments can permit employees to (perhaps unwittingly) export sensitive, confidential or protected information outside organizational boundaries and controls – This can incur potential civil and criminal liabilities, as well as loss of customer trust and brand equity http://bit.ly/CARMcloud
  • 9. And The Ugly • Online crime is an ever-increasing part of the threat landscape. Beyond the threats of damage or data loss from malware, professional criminals have gone online to ply their unsavoury trades • Corporations, institutions, government agencies, and other large organizations can fall prey to various kinds of cyberwarfare, that aim to steal information, transfer funds, or perform other illicit activities http://bit.ly/CARMcloud
  • 10. Botnets • One of the ugliest elements of this side of the online universe is botnets • A bot is an individual computer that has been compromised with malware that takes instructions from a criminal. Each such computer is called a bot and collections of such computers are called botnets • Some common forms of attack include: – Phishing-based attack – credentials are stolen or additional victims claimed. Phishing can open the door to network penetration and compromise – Search Engine Optimization (SEO) attack – gaming search engines to include malicious sites high in page rankings. Victims search for a popular term and land on the malicious site unknowingly. This can also open the door to network penetration and compromise – Compromised legitimate websites - this can happen in various ways without detection by the site operator. For example, ads being served by a third party that redirect visitors to malicious sites, injecting malicious code into the site itself, or replacing legitimate HTML code with code that contains malware – Internal infections - this is often achieved by using an auto-run function, once the device is introduced to a network. However, some botnets can infect legitimate files on mobile devices that are executed on-demand by victims http://bit.ly/CARMcloud
  • 11. Traditional firewalls can’t keep up with today’s threats • Because network traffic is so heavily web- and application- based, the ability of legacy security technologies to protect internal networks is increasingly challenged, to say the least • Attacks have become more frequent and more serious. Every day new attacks are designed to avoid detection and come up with more and better ways to steal our information • As attacks and their consequences become more dangerous and costly, organizations are learning to their dismay that their existing security infrastructures can’t keep up • Traditional firewalls and security appliances have lost their ability to block such traffic, which means prevailing tools and technologies can’t prevent the worst and most nefarious attacks from affecting or damaging networks http://bit.ly/CARMcloud
  • 12. Inadequate Protection (at Best) • One of the first and most basic lines of network defence is a firewall, a device that inspects inbound and out-bound traffic on a network • Firewalls were the first widely deployed network security technology when internet use really began in earnest. The firewall’s job is to inspect traffic and decide what is allowed to go from outside to inside, and from inside to outside • But network traffic has changed vastly in the last decade, and a great proportion is now web-based • Because of the commingling of modern application traffic with everyday web access, traditional port-based firewalls have essentially become blind to the most common type of network traffic • This means: – They cannot distinguish different types of traffic that use the same port – They cannot detect applications that tunnel inside other applications – They cannot see inside encrypted packets – They can’t even block sneaky rogue applications that use nonstandard port numbers http://bit.ly/CARMcloud
  • 13. Evolving firewall technology still can’t keep up • As simple rules for filtering traffic in a firewall proved to be too permissive, firewall vendors deployed new technology to stay abreast of the changing threat landscape • One important advance was the development of a proxy server, which sits transparently on the network and checks all packets for policy compliance before forwarding them • Various other security protocols were also developed to distinguish legitimate communications from suspicious or malicious types of connections, allowing only packets that corresponded to a valid, recognized, active connection between a client and server and rejecting everything else • In spite of these advances, firewalls could not stop the evolving threats. With each new firewall technology, the hackers devised new evasion techniques. New threats simply slipped through legacy firewalls and headed right onto the trusted network, attacking clients and servers with gusto and abandon • Network security vendors sought to fight back by creating new technologies to fight the new threats http://bit.ly/CARMcloud
  • 14. From Firewalls to Stand-alone Products • Over time, as the threat landscape evolved, organizations began adding specialized or stand-alone security devices to their infrastructures, with the intention of providing workarounds to the limitations of traditional firewalls • Each device addresses a specific threat: One appliance provides malware screening, and another provides content filtering of websites and traffic. Still others detect and block intrusions, or add spam filtering and e-mail message handling. Put them all together on a network, and you could have half a dozen or more appliances, each inspecting the stream of traffic moving across the network • All of these devices were designed to improve a network’s security by adding functionality missing from the firewall. However, a patchwork of stand-alone technologies can have the opposite effect on network visibility as well as performance. They don’t talk to each other easily (if at all). They lack central management and monitoring because each product operates on its own. Plus, data from individual devices isn’t aggregated to create a complete or holistic view http://bit.ly/CARMcloud
  • 15. Examples of Stand-alone Security Appliances Here are some examples of typical stand-alone security appliances that are deployed in a network: • Virtual private network (VPN): Uses special protocols to move information across the Internet securely • Data loss prevention (DLP): Looks for confidential, proprietary, or regulated data leaving the network. It can stop wholesale loss of proprietary data, as well as small scale accidental losses • Intrusion prevention system (IPS): Acts as a network’s watchdog, looking for patterns of network traffic and activity, and recording events that may affect security • Content filtering technologies: These devices block traffic to and/or from a network by IP address, domain name/URL, type of content or payload http://bit.ly/CARMcloud
  • 16. The reality of using Stand- alone security appliances • There are several implications of the use of stand- alone security appliances, namely: – Multiple devices create a performance hit – Reduced network visibility – Total Cost of Ownership is far too high • The benefits of moving away from this approach include: – An integrated and holistic view of network security – Optimal TCO – Minimal latency impact http://bit.ly/CARMcloud
  • 17. Finding a way out… • Many organizations want to find a way out of the expensive, labour-intensive, unsecure, and chaotic mess of traditional firewalls supplemented with multiple stand- alone security technologies • Unified Threat Management (UTM) is the approach that many organizations have adopted to improve visibility and control of their network security while lowering complexity of their networks • UTM creates an environment in which all network security falls beneath a single, consistent technology umbrella • UTM enables the consolidation of all traditional as well as next-generation firewalls into a single device http://bit.ly/CARMcloud
  • 18. Stepping up to UTM • UTM represents a significant shift in the evolution of network security technology and equipment • UTM generally refers to a security appliance that consolidates a wide range of essential network security functions into a single device, including next-generation firewall technologies like application control • As network threats evolve and new threats emerge, network security must change and adapt to protect against such threats. This adaptability can make UTM difficult to define because the technologies included can vary from vendor to vendor • Over time, however, the collection of capabilities associated with UTM has consistently expanded, and this trend shows no sign of tapering off http://bit.ly/CARMcloud
  • 19. UTM – bringing order to chaos The best UTM solutions include the following core security functions: • Network firewalls perform stateful packet inspection • IPS detects and blocks intrusions and certain attacks • Application control provides visibility and control of application behaviour and content • VPN enables secure remote access to networks • Web filtering halts access to malicious, inappropriate, or questionable websites and online content • IPv6 support in all network security functions protects networks as they migrate from IPv4 to IPv6 • Support for virtualized environments, both virtual domains and virtual appliances http://bit.ly/CARMcloud
  • 20. Additional technologies UTM solutions may also include additional security technologies that organizations can choose to deploy, including: • Data loss prevention that blocks accidental or intentional loss of confidential, proprietary, or regulated data • Anti-malware/anti-spam protection that prevents malicious payloads or unwanted messages from entering networks • Endpoint control that enforces corporate security policies with remote users and devices http://bit.ly/CARMcloud
  • 21. Flexible, Future-Ready and Powerful • UTM delivers a flexible, future-ready solution to meet the challenges of today’s networking environments • Not every organization is going to deploy every technology included in a UTM device; in fact, most do not, but a UTM gives an organization the ability to deploy as many or as few technologies as it needs, when and where it needs them • The best UTM solutions employ a simple licensing model that includes all technologies, eliminating the need to purchase additional modules or to count users as an organization’s security requirements change over time • UTM delivers a versatile, powerful solution to meet the challenges of today’s most complex networking environment. It overcomes shortcomings of non-integrated, legacy systems built around traditional firewalls and individual, stand-alone appliances and software http://bit.ly/CARMcloud
  • 22. UTM – Significant Advantage • One significant advantage UTM devices have over legacy firewalls (combined with multiple appliances), is integrated management. The “single pane of glass” management console of UTM provides a consolidated management interface with ready access to all configurations, management, and monitoring functions • This is especially useful when it comes to seeing and reacting to combinations of events that represent a sophisticated attack. This reduces the likelihood of common failings from traditional systems, including failure to notice an incident or event, failure to act in a timely fashion, and failure to maintain compliance and audit controls http://bit.ly/CARMcloud
  • 23. UTM – Other Business Advantages There are many other significant advantages to UTM, namely: • Cost effectiveness – driven by consolidation of network and security management • Improved awareness • Reduced ‘false sense of security’ • Accelerated processing speeds-up business • Ability to keep pace with the changing threat landscape http://bit.ly/CARMcloud
  • 24. UTM delivers a flexible, future- ready solution to meet the challenges of today’s networking environments. For a more detail on all of the topics covered in this summary, please download our free e- book: Unified Threat Management for Dummies http://bit.ly/CARMcloud