1 00:00:00,930 --> 00:00:03,080 Unified threat management. 2 00:00:03,080 --> 00:00:06,090 The unified threat management or UTM system 3 00:00:06,090 --> 00:00:07,900 is a newer concept that was introduced 4 00:00:07,900 --> 00:00:09,890 in the last five to 10 years. 5 00:00:09,890 --> 00:00:12,060 Basically, security professionals realize, 6 00:00:12,060 --> 00:00:13,920 as I'm sure you're realizing now too, 7 00:00:13,920 --> 00:00:15,620 that relying on a single firewall 8 00:00:15,620 --> 00:00:17,810 is not enough to protect our networks, 9 00:00:17,810 --> 00:00:22,050 and so a UTM was created. Now, a unified threat management 10 00:00:22,050 --> 00:00:24,720 system is a combination of network security devices 11 00:00:24,720 --> 00:00:26,450 and technologies that are added to 12 00:00:26,450 --> 00:00:28,460 a network to better protect it. 13 00:00:28,460 --> 00:00:30,901 Simply put, a UTM is a single device 14 00:00:30,901 --> 00:00:34,680 that combines many other devices and technologies into it. 15 00:00:34,680 --> 00:00:37,660 For example, your UTM might include a firewall, 16 00:00:37,660 --> 00:00:39,400 a network intrusion detection system, 17 00:00:39,400 --> 00:00:41,360 or a network intrusion prevention system, 18 00:00:41,360 --> 00:00:44,090 a content filter or a proxy, an antivirus 19 00:00:44,090 --> 00:00:47,060 or anti-malware gateway, a data loss prevention system, 20 00:00:47,060 --> 00:00:50,570 and maybe even a site-to-site VPN, if you have the need. 21 00:00:50,570 --> 00:00:52,800 Now, these devices are designed to make it easier 22 00:00:52,800 --> 00:00:54,770 for a security administrator to use them. 23 00:00:54,770 --> 00:00:57,340 And instead of relying on a command line interface, 24 00:00:57,340 --> 00:00:58,900 with all the tech space commands, 25 00:00:58,900 --> 00:01:01,310 they get a graphical user interface instead. 26 00:01:01,310 --> 00:01:04,200 It allows them to make policies, rules, and signatures 27 00:01:04,200 --> 00:01:07,180 that makes it much easier and much quicker to use. 28 00:01:07,180 --> 00:01:08,870 Now, UTMs provide a singular 29 00:01:08,870 --> 00:01:10,930 package with multiple protections. 30 00:01:10,930 --> 00:01:13,200 And they are essentially a defense in depth strategy 31 00:01:13,200 --> 00:01:15,420 within a single device or system. 32 00:01:15,420 --> 00:01:17,400 Because of this, often these devices 33 00:01:17,400 --> 00:01:19,560 will replace your firewall, and it's usually placed 34 00:01:19,560 --> 00:01:22,330 as the outermost device in your local area network 35 00:01:22,330 --> 00:01:25,240 to provide its perimeter defense and its protections. 36 00:01:25,240 --> 00:01:27,900 You may have also heard the term, Next Gen Firewall, 37 00:01:27,900 --> 00:01:31,860 or Next Generation Firewall, also known as NGFW. 38 00:01:31,860 --> 00:01:34,230 If you've heard this term, it's because it's being used 39 00:01:34,230 --> 00:01:35,570 in the industry instead of using 40 00:01:35,570 --> 00:01:38,640 the term UTM or unified threat management. 41 00:01:38,640 --> 00:01:40,980 These are those all-in-one security devices 42 00:01:40,980 --> 00:01:43,470 and that's all a Next Generation Firewall is. 43 00:01:43,470 --> 00:01:45,350 This is a marketing ploy because people 44 00:01:45,350 --> 00:01:47,300 weren't understanding the UTM concept, 45 00:01:47,300 --> 00:01:48,600 but they understood firewalls, 46 00:01:48,600 --> 00:01:50,630 and so calling it a Next Generation Firewall 47 00:01:50,630 --> 00:01:51,980 helped them increase sales.