A continuation of the previous blog post, these terms extend the description of the protective technologies that current firewalls are capable of.
Unified Threat Management (UTM )
UTM protects from attacks, viruses, Trojans and other malicious threats by consolidating multiple network security features onto one platform. This can include network firewall, intrusion detection/prevention, gateway anti-virus, etc. UTM takes advantage of the current processing power available and improves security by integrating and centralizing protection.
Application Intelligence & Control
Provides the ability of the firewall to prioritize, manage and allow/disallow traffic based on the application being accessed. Allows administrators to create bandwidth management policies and easily visualize the traffic flowing through the network. Application Intelligence provides real-time feed of network performance over multiple applications. Important to maximizing security and increasing network efficiency. Helps eliminate waste and promotes more fluid IT management.
Remote Access and Virtual Private Networking (VPN)
Virtual Private Networking provides Remote Access by securing communication between parties not located directly on the office network. Uses encryption to guarantee authenticated access and keeps personal information secure when working remotely.
High Availability for firewall systems are usually implemented by providing redundant components in the systems. This can mean redundant processors, additional network ports, or even a standby firewall. In the case of a standby firewall, changes and traffic are mirrored to the standby so that in case the primary fails, the secondary or backup system can pick up the load – sometimes without the users even knowing there was an issue. This helps maintain network and operational integrity, protecting data in the event of a system failure and reduces the likelihood of large amounts of downtime without requiring personnel intervention.
Management and Reporting Services
Management and Reporting enhances real-time security by pulling the information on system performance, traffic, utilization, destination information, etc. Many industries require proof of active monitoring of security, and other industries require specific compliance reports. The Management and Reporting system for the firewall typically provides these reports and audit trails. For more complicated operations, it can provide a global view of networks. Used as a tool to manage various features of a firewall system.
For any additional questions you may have on firewall security for your small business or other networking and data security issues, don’t hesistate to connect with us today.