What is UTM and how does it work?

22.11.2019
Security

Securing an enterprise’s network infrastructure is a top priority. An attack on the network can involve data leakage, attack DDoS, leakage of sensitive information or personal data. There is a comprehensive solution that protects the entire network layer, from the company’s point of contact with the Internet to the personal computer.

Smaller and medium-sized companies (up to 1,000 employees) typically do not employ a dedicated security person. Network security is the responsibility of IT professionals, who shoulder many tasks ranging from software updates on servers to non-working equipment in the office. Thus, there is often not enough time to keep an eye on everything and take full care of the security level. However, UTM is a solution not only for small and medium-sized companies.

What is UTM?

UTM(unified threat management), are UTM-class security systems that comprehensively protect an IT system. UTM is a type of firewall, combining multiple functions:

  • firewall
  • IPS intrusion prevention system,
  • VPN,
  • Web content control (URL filtering),
  • antivirus protection system,
  • protection against spyware (antispyware),
  • protection against unwanted e-mail (anti-spam),
  • Control of the file transfer application (e.g., Instant Messaging and P2P),
  • traffic shaping (traffic shaping),
  • WLAN security against attack,
  • Optimization and acceleration of data transmitted over the WAN.

UTM eliminates threats from outside the corporate network that affect data resources, networks, servers and applications. By using UTM, you can save the costs associated with using multiple disconnected security systems.

UTM: how does it work and what questions are worth asking?

UTM is an end-to-end IT system protection integrated on a single device. By transferring processes and algorithms to an external device, it enables more accurate filtering of content and blocking of attacks. Before choosing a UTM for your own company, you need to ask yourself a few questions about your needs in this area:

  • Is UTM necessary for comprehensive protection or merely an addition to the security infrastructure already in place?
  • What types of UTM protection do you plan to implement?
  • Specify the number of locations and subnets you want to protect and how many and what types of ports you need,
  • Do you need a WiFi controller integrated into your UTM?
  • Network bandwidth: what amount do you have? Check upload/download link statistics (average number of users connected to the Internet, daily number of e-mails, parameters at peak times). User requirements are trending upward.
  • What is the number of users on your network? How much has it increased in the last 2 years?

What does UTM provide?

  • Email protection – stops viruses, spam, encrypts emails
  • WIFI network protection – makes it easy to manage access to WIFI networks, create hotspots for guests
  • Protection of the server from intrusions
  • Protection of edge points – protection of web browsing, devices i.e. desktop, laptop, smartphone
  • Web protection – restricting access to social media, improving employee productivity
  • Network security – configuration with VPN and remote access capabilities.

UTM at ITH

Network protection, data backup, auditing and monitoring, cloud firewall, VPN, high-speed hosting or SSL certificate – these are only part of our offer. ITH.EU is a provider of telecommunications services for startups, large and small businesses, public institutions and corporations. We encourage you to use the services of our specialists.