Try our new research platform with insights from 80,000+ expert users
2020-03-16T06:48:00Z

When evaluating Unified Threat Management (UTM), what aspect do you think is the most important to look for?

Ariel Lindenfeld - PeerSpot reviewer
  • 2
  • 9
PeerSpot user
4

4 Answers

RA
Real User
2024-11-07T12:24:20Z
Nov 7, 2024
Search for a product comparison in Unified Threat Management (UTM)
2020-12-29T20:15:35Z
Dec 29, 2020
JS
User
2020-04-01T11:43:35Z
Apr 1, 2020
GS
MSP
2020-03-25T16:46:42Z
Mar 25, 2020
Find out what your peers are saying about Check Point Software Technologies, Sophos, Cisco and others in Unified Threat Management (UTM). Updated: December 2024.
823,795 professionals have used our research since 2012.
Unified Threat Management (UTM)
What is a Unified Threat Management System? A UTM is an all-in-one information security approach in which a single converged platform (application or appliance) provides multiple security services. This can resolve implementation and integration challenges that might result from using different products from different vendors. A UTM may include network firewalls, anti-spam, anti-spyware, anti-virus, intrusion detection and prevention, email and web content filtering, NAT (network address...
Download Unified Threat Management (UTM) ReportRead more

Unified Threat Management (UTM) experts

Nagendra Nekkala - PeerSpot reviewer
Adrian Cambronero - PeerSpot reviewer
Md. Al Imran Chowdhury - PeerSpot reviewer
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Mitesh D Patel - PeerSpot reviewer
Ajenthan Aiyathurai - PeerSpot reviewer
WA
DA