Trial lock

This Research is for Members Only

Not a member? Unlock a free sample of our research now!

Already a member?

Sign in now

Industry Research icon

Vendor Landscape: Unified Threat Management

The perimeter firewall grows up and becomes a Swiss Army Knife of protection capabilities.

Unlock a Free Sample


Vendor

You are currently over the vendor limit, please adjust your weightings to equal exactly 100%.

Product

You are currently over the product limit, please adjust your weightings to equal exactly 100%.

What matters more, the vendor score or the product score? As you weigh the importance, we will generate the vendor shortlist to match your needs.

View Vendor Shortlist

What is a shortlist?

A shortlist is a personalized list of vendors based on the criteria you define. Your shortlist offers more information about vendor's strengths, weaknesses, price-points, etc, and ranks them according to your needs.


Access this Vendor Shortlist by logging in with your Info-Tech Research Group membership or unlocking this content.

Champion

What is a Value Score?

The Value Score indexes each vendor’s product offering and business strength relative to their price point. It does not indicate vendor ranking.

Vendors that score high offer more bang for the buck (e.g. features, usability, stability, etc.) than the average vendor, while the inverse is true for those that score lower.

Price-conscious enterprises may wish to give the Value Score more consideration than those who are more focused on specific vendor/product attributes.

View Storyboard

Solution Set Storyboard Thumbnail

Your Challenge

  • Every enterprise needs to implement the right security solutions to protect its operations and its data; “Firewalls” are a table-stakes requirement for an enterprise to be secure.
  • UTM solutions have replaced traditional firewalls and are in danger of themselves being replaced by Next Generation Firewalls; the names change as feature portfolios broaden.
  • Picking the right solution means appropriate protection at an acceptable cost; picking wrong could mean higher cost, lower security, or both.

Our Advice

Critical Insight

  • The only traffic that counts anymore is HTTP/S: As all traffic becomes Web traffic, controlling traffic flow by protocol becomes keyed to digging into Port 80 (and 443) traffic.
  • Inbound no longer the only direction that threats flow: As security focus has shifted from infrastructure to data, protection needs to address outbound flow as much as inbound attacks.
  • Firewalls can’t protect traffic they can’t see: Encrypted traffic obfuscates threats from Firewalls while WiFi networks allow attacks to bypass them entirely; modern solutions must control these traffic types also.

Impact and Result

Enterprises that plan carefully and select thoughtfully can improve enterprise security while reducing cost and trimming administrative effort with a capable UTM/NGFW; the broader capabilities these tools offer means organizations can get rid of older point solutions that supported the incumbent firewall.

Research & Tools

1. Evaluate UTM/NGFW solutions

Find the Unified Threat Management/Next Generation Firewall that best meets enterprise needs.

2. Identify UTM/NGFW criteria that are most important to you

Develop a custom shortlist of the most appropriate UTM/NGFW solutions.

Talk to an Analyst

Our analyst calls are focused on helping our members use the research we produce, and our experts will guide you to successful project completion.

Book an Analyst Call on this topic.

You can start as early as tomorrow morning. Our analysts will explain the process in your first call.

Get advice from a subject matter expert.

Each call will focus on explaining the material and helping you to plan your project, interpret and analyze the results of each project step, and setting the direction for your next project step.

Search Code: 46017
Published: August 15, 2011
Last Revised: August 15, 2011