Get Instant Access
to This Blueprint

Industry Research icon

Vendor Landscape: Unified Threat Management

The perimeter firewall grows up and becomes a Swiss Army Knife of protection capabilities.

  • Every enterprise needs to implement the right security solutions to protect its operations and its data; “Firewalls” are a table-stakes requirement for an enterprise to be secure.
  • UTM solutions have replaced traditional firewalls and are in danger of themselves being replaced by Next Generation Firewalls; the names change as feature portfolios broaden.
  • Picking the right solution means appropriate protection at an acceptable cost; picking wrong could mean higher cost, lower security, or both.

Our Advice

Critical Insight

  • The only traffic that counts anymore is HTTP/S: As all traffic becomes Web traffic, controlling traffic flow by protocol becomes keyed to digging into Port 80 (and 443) traffic.
  • Inbound no longer the only direction that threats flow: As security focus has shifted from infrastructure to data, protection needs to address outbound flow as much as inbound attacks.
  • Firewalls can’t protect traffic they can’t see: Encrypted traffic obfuscates threats from Firewalls while WiFi networks allow attacks to bypass them entirely; modern solutions must control these traffic types also.

Impact and Result

Enterprises that plan carefully and select thoughtfully can improve enterprise security while reducing cost and trimming administrative effort with a capable UTM/NGFW; the broader capabilities these tools offer means organizations can get rid of older point solutions that supported the incumbent firewall.


Vendor Landscape: Unified Threat Management Research & Tools

1. Evaluate UTM/NGFW solutions

Find the Unified Threat Management/Next Generation Firewall that best meets enterprise needs.

2. Identify UTM/NGFW criteria that are most important to you

Develop a custom shortlist of the most appropriate UTM/NGFW solutions.

Vendor Landscape: Unified Threat Management preview picture

About Info-Tech

Info-Tech Research Group is the world’s fastest-growing information technology research and advisory company, proudly serving over 30,000 IT professionals.

We produce unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. We partner closely with IT teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.

What Is a Blueprint?

A blueprint is designed to be a roadmap, containing a methodology and the tools and templates you need to solve your IT problems.

Each blueprint can be accompanied by a Guided Implementation that provides you access to our world-class analysts to help you get through the project.

Talk to an Analyst

Our analyst calls are focused on helping our members use the research we produce, and our experts will guide you to successful project completion.

Book an Analyst Call on This Topic

You can start as early as tomorrow morning. Our analysts will explain the process during your first call.

Get Advice From a Subject Matter Expert

Each call will focus on explaining the material and helping you to plan your project, interpret and analyze the results of each project step, and set the direction for your next project step.

Unlock Sample Research

Author

James Quin

Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019