Wednesday, September 28, 2011

Unified Threat Management Solutions Now: Chatting with Lisa Phifer

As more and more business collaboration takes place online, threats to online security become greater threats to business agility and efficiency – and continuity. Herewith, some key take-aways from an online audio discussion and chat about unified threat management or UTM devices. These are basically computer-hardware-and-software "appliances" that automatically protect business computing and networking facilities from multiple threats, such as viruses, spam and unauthorized network intrusions. Their all-in-one design makes them affordable, manageable options even for small and mid-sized businesses (SMBs) and small or remote facilities of larger enterprises.

This online chat featured Lisa Phifer, president of security and networking consultancy Core Competence. She has been involved in the design, implementation, and evaluation of networking, security, and management products for more than 25 years. She was formerly a member of the technical staff at Bell Communications Research and senior staff architect at Unisys. She teaches about IT and security, has written extensively for numerous publications, and is a featured speaker at leading conferences.

The event, "Choosing the Unified Threat Management Product That's Right for Your SMB," was part of the Online Audio Series at TheSecureSMB.com, which is open to everyone with complementary registration. An archive of the audio portion of chat with Lisa is available at http://tobtr.com/s/2173127. Many thanks to The Secure SMB team and all of the chat participants for their great questions, some of which generated Lisa's guidance as summarized below.


UTM, the cloud and new network client options: One chat participant asked how UTM appliances can help companies to deal with the growth of "the mobile, social cloud," remote working and "BYOC" ("Bring Your Own Computer") initiatives. Such initiatives create an even greater role for network security solutions and their management, because business can't necessarily put security measures on every authorized device, Lisa replied.

However, "[UTM appliances] that do have the ability to fit into some type of NAC [network access control] architecture can leverage endpoint health and integrity inspection [features] to protect the net from infected devices," Lisa said. Some of those UTM appliances also offer intrusion protection features that can detect and help to "quarantine" infected device activities, she added.

Business and technology decision makers should strive to ensure close integration of the management of their chosen UTM and security solutions. Those decision makers should then invoke all of the available features of those solutions that make business sense and maximize protection against infection, Lisa affirmed.

UTM appliances vs. point solutions: Another chat participant asked, "Is it better than to have multiple devices than one device? This way you can upgrade pieces as they become the slower devices on the network [and] the costs can be managed over time," especially for cash-strapped smaller businesses.

"Multiple devices add latency and points of failure. They are also costly to replace," Lisa replied. "The idea behind UTM is to give you one device to reduce latency, management complexity, and points of failure. However, you do create a potential bottleneck – one that you can manage by upgrading the UTM [appliance] or replacing it with a larger model." Another option is to use load balancing, a feature included with some UTM appliances, to divide threat management across multiple UTM solutions.

No comments:

Post a Comment