From the course: CISSP Cert Prep (2021): 4 Communication and Network Security
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Unified threat management
From the course: CISSP Cert Prep (2021): 4 Communication and Network Security
Unified threat management
- [Narrator] We've talked about a lot of different security devices in this course. And one of the major issues associated with them is that purchasing all of these devices can be very expensive particularly for a small or mid-sized organization. Unified Threat Management or UTM solutions try to solve this problem by combining many different security functions on a single device. UTM products start by performing the basic functions of a firewall and router protecting the network against many attacks blocking unsolicited traffic and routing traffic to and from the internet. Then they add some of the security features that we've discussed already in this course, including VPN connectivity, intrusion detection, and intrusion prevention. UTM products also often include other features useful to small businesses that might not be found in enterprise security devices. For example, they often perform both URL filtering to…
Contents
-
-
-
-
-
Routers, switches, and bridges3m 6s
-
(Locked)
Firewalls6m 7s
-
(Locked)
Proxy servers2m 41s
-
(Locked)
Load balancers4m 9s
-
(Locked)
VPNs and VPN concentrators4m 29s
-
(Locked)
Network intrusion detection and prevention5m 1s
-
(Locked)
Protocol analyzers8m 57s
-
(Locked)
Unified threat management1m 57s
-
(Locked)
Content distribution networks4m 4s
-
-
-
-
-
-
-
-