SlideShare a Scribd company logo
1 of 27
UNIFIED THREAT MANAGEMENT

NISHA MENON K
ROLL NO: 16
M-TECH
COMMUNICATION ENGINEERING
12/23/2013

1
OUTLINE
 INTRODUCTION
 THREATS

 FEATURES OF UTM
 TYPES OF UTM
 ADVANTAGES

 DISADVANTAGES
 NEXT GENERATION UTM
 CONCLUSION
12/23/2013

2
INTRODUCTION
Unified threat management (UTM) is a comprehensive solution
that has recently emerged in the network security industry.
.
A Unified Threat Management (UTM) can simplify management of
security strategy, with just one device taking the place of
multiple layers of legacy security hardware and software.
Additionally, UTM security solutions can be monitored and
configured from a single, centralized management console.

12/23/2013

3
Why UTM??

12/23/2013

4
Why UTM??
• UTM solutions emerged of the need to stem the increasing number
of
attacks
on
corporate
information
systems
via
hacking/cracking, viruses, worms - mostly an outcome of
blended threats and insider threats.
• Firms have been increasingly falling victim to attacks from cyber
hackers.
• Traditional security solutions which evolved to tackle specific
threats are usually more difficult to deploy, manage and update.
This increases operational complexities and overhead costs.

• Today's organizations demand an integrated approach to network
security and productivity that combines the features of traditional
technologies with the streamlined ease of use of UTM
12/23/2013

5
 UTM typically includes a firewall, antivirus software,

content filtering and a spam filter in a single
integrated package.

Content
filtering

Firewall
Antivirus

12/23/2013

6
THREATS
THREATS/ATTACKS

Spyware

12/23/2013

Application
Attacks

File based threats

Email viruses

7
Spyware/Adware
 Spyware is any software that utilizes a computer’s

Internet access without the host’s knowledge or
explicit permission
 Approximately 90% of computers have some form of

Spyware.
 Aids in gathering information:




12/23/2013

Browsing habits (sites visited, links clicked, etc.)
Data entered into forms (including account
names, passwords, text of Web forms and Web-based
email, etc.)
Key stokes and work habits
8
Application
Attacks

 Unpatched Servers:
 Servers do not get up to date

Buffer Overflow

patches

Malicious Hacker

 Attacker sends malicious code

through a buffer overflow
 Server is infected
 New users who access server get

infected

12/23/2013

9
File Based
Threats

 Example: Internet download
 Viruses and malicious code
File Server

infection:
 Peer to Peer

Corp Network

 Instant Messaging apps
 Shareware sites
 Compromised servers
 Legitimate corporations
 Web based email

 Threats pass through firewalls
 Once inside the network, others

are easily affected

12/23/2013

10
E-mail Viruses
 E-mail has become the primary

Corp Network

means for distributing threats
 Trojans are easy to deliver and
install
 HTML viruses (no user
intervention) with webmail
 E-mails with attachments
containing:
 java scripts and html scripts

12/23/2013

11
FEATURES OF UTM
FIREWALL INSPECTION
INTRUSION PREVENTION
URL FILTERING
ANTI-VIRUS
ANTI-SPAM
VIRTUAL PRIVATE NETWORK

12/23/2013

12
• FIREWALL INSPECTION
• A system designed to prevent unauthorized access to or from a
private network
• Firewalls can be implemented in both hardware and software, or a
combination of both.

12/23/2013

13
• INTRUSION PREVENTION
• Intrusion prevention systems (IPS), also known as intrusion detection
and prevention systems (IDPS)
•

Monitor network and/or system activities for malicious activity

• Identify malicious activity, log information about this activity, attempt to
block/stop it, and report it

12/23/2013

14
• URL FILTERING
URL filtering is strictly a client protection technology of UTM.
It can be used for both providing policy enforcement, such as limiting access
to what sites different users can access based on category and organizational
policy, as well as to act as another layer of security by limiting access to
potentially malicious sites.

12/23/2013

15
• ANTI-SPAM
• Unwanted e-mail messages, usually sent by commercial, malicious, or
fraudulent entities .
• The anti-spam feature examines transmitted e-mail messages to identify
spam.
• When the device detects a message seemed to be spam, it blocks the
e-mail message.

12/23/2013

16
• ANTI VIRUS

The UTM Appliance AntiVirus feature handles the
detection and removal of viruses.

12/23/2013

17
• VPN (VIRTUAL PRIVATE NETWORK)
Used to connect two or more private networks via the
internet

•Provides an encrypted tunnel
between the two private networks
•Usually cheaper than a private
leased line
•Once established and as long as the
encryption remains secure the VPN is
impervious to exploitation

12/23/2013

18
STANDARD - UTM
 Unified Threat Management

 Integration of
• Firewall
• Intrusion Prevention for blocking network
threats
• Anti-Virus for blocking file based threats
• Anti-Spyware for blocking Spyware
 Faster updates to the dynamic changing

threat environment and elimination of False
Positives
12/23/2013

19
Integrated Threat Protection in Action

Error message:
“Drops” copy of itself
on system and
attempts to propagate

“Innocent” Video Link:
Redirects to malicious Website

“Out of date” Flash player error:
“Download” malware file

Solution:
Integrated Web Filtering
Blocks access to malicious Website
Network Antivirus
Blocks download of virus
Intrusion Protection
Blocks the spread of the worm
12/23/2013

20
TYPES OF UTM

UTM
Hardware
based

12/23/2013

Software
based

21
ADVANTAGES
• REDUCED COMPLEXITY: Single security solution.
• SIMPLICITY : Avoidance of multiple software installation and
maintenance
• EASY MANAGEMENT
• LOW OPERATOR INTERACTION

• EASY TO TROUBLESHOOT

12/23/2013

22
DISADVANTAGES
o Single point of failure for network traffic
o Single point of compromise if the UTM has vulnerabilities
o Potential impact on latency and bandwidth when the UTM cannot keep
up with the traffic

12/23/2013

23
NEXT GENERATION - UTM
Identity-based UTM: provide discrete identity information
of each user in the network along with network log data.

They allow creation of identity-based network access policies for
individual users, delivering complete visibility and control on the
network activities.
Voice Over IP security
Instant Messaging
Worm protection
Expanded security
security to every corner of an organization’s network, from the core to
the perimeter and every point in between.

12/23/2013

24
CONCLUSION
• UTM is answer to new challenges in the “wild” Internet
• UTM is integrated solution with easy management
• UTM offers complete support for all users, whether they are at an
enterprise site or in between network zones-ensuring maximum
protection

12/23/2013

25
REFERENCE
[1] Ranjit Shrirang Nimbalkar , Dr. B. B. Meshram “Survey on Integrated
Management” International Journal of Engineering Research &
Technology (IJERT), Vol. 2, Issue 6, June - 2013
[2] U.R.Naik and P.R.Chandra, “Designing Highperformance
Networking Applications,” Intel Press, 2004.

12/23/2013

26
12/23/2013

27

More Related Content

What's hot

FireWall
FireWallFireWall
FireWall
rubal_9
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
Reza Kopaee
 

What's hot (20)

VAPT Services by prime
VAPT Services by primeVAPT Services by prime
VAPT Services by prime
 
Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics
 
Fortinet sandboxing
Fortinet sandboxingFortinet sandboxing
Fortinet sandboxing
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Network security
Network securityNetwork security
Network security
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
 
IPS (intrusion prevention system)
IPS (intrusion prevention system)IPS (intrusion prevention system)
IPS (intrusion prevention system)
 
Brute Force Attack Security Use Case Guide
Brute Force Attack Security Use Case Guide	Brute Force Attack Security Use Case Guide
Brute Force Attack Security Use Case Guide
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Wazuh Security Platform
Wazuh Security PlatformWazuh Security Platform
Wazuh Security Platform
 
Information security
Information securityInformation security
Information security
 
FireWall
FireWallFireWall
FireWall
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Firewall
Firewall Firewall
Firewall
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 

Viewers also liked

Unified Threat Management
Unified Threat ManagementUnified Threat Management
Unified Threat Management
Milan Petrásek
 
Sophos Certified Engineer
Sophos Certified EngineerSophos Certified Engineer
Sophos Certified Engineer
Franklin Nsude
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
Amandeep Kaur
 

Viewers also liked (14)

Unified Threat Management
Unified Threat ManagementUnified Threat Management
Unified Threat Management
 
Sophos Utm Presentation 2016
Sophos Utm Presentation 2016Sophos Utm Presentation 2016
Sophos Utm Presentation 2016
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security Box
 
An introduction to Unified Threat Management (UTM), for Dummies
An introduction to Unified Threat Management (UTM), for DummiesAn introduction to Unified Threat Management (UTM), for Dummies
An introduction to Unified Threat Management (UTM), for Dummies
 
Unified Threat Management Solutions
Unified Threat Management SolutionsUnified Threat Management Solutions
Unified Threat Management Solutions
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser Protection
 
Sophos Certified Engineer
Sophos Certified EngineerSophos Certified Engineer
Sophos Certified Engineer
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
Alphorm.com Formation Sophos UTM
Alphorm.com Formation Sophos UTMAlphorm.com Formation Sophos UTM
Alphorm.com Formation Sophos UTM
 
Fortigate Training
Fortigate TrainingFortigate Training
Fortigate Training
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar to unified threat management by Nisha Menon K

Unlocking the Promise of UTM Protection
Unlocking the Promise of UTM ProtectionUnlocking the Promise of UTM Protection
Unlocking the Promise of UTM Protection
Kerry Desberg
 
Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...
Lana Sorrels
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
isidro luna beltran
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
srtwgwfwwgw
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
karenahmanny4c
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
croysierkathey
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System

Similar to unified threat management by Nisha Menon K (20)

Are You Wondering Why Your Organization Needs An Unified Threat Management Sy...
Are You Wondering Why Your Organization Needs An Unified Threat Management Sy...Are You Wondering Why Your Organization Needs An Unified Threat Management Sy...
Are You Wondering Why Your Organization Needs An Unified Threat Management Sy...
 
Are You Wondering Why Your Organization Needs a Unified Threat Management Sys...
Are You Wondering Why Your Organization Needs a Unified Threat Management Sys...Are You Wondering Why Your Organization Needs a Unified Threat Management Sys...
Are You Wondering Why Your Organization Needs a Unified Threat Management Sys...
 
Unlocking the Promise of UTM Protection
Unlocking the Promise of UTM ProtectionUnlocking the Promise of UTM Protection
Unlocking the Promise of UTM Protection
 
unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptx
 
A guide to Unified Threat Management Systems (UTMs) by Rishabh Dangwal
A guide to Unified Threat Management Systems (UTMs) by Rishabh DangwalA guide to Unified Threat Management Systems (UTMs) by Rishabh Dangwal
A guide to Unified Threat Management Systems (UTMs) by Rishabh Dangwal
 
Prevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network SecurityPrevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network Security
 
How unified threat management (utm) can benefit your enterprise network envir...
How unified threat management (utm) can benefit your enterprise network envir...How unified threat management (utm) can benefit your enterprise network envir...
How unified threat management (utm) can benefit your enterprise network envir...
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
 
Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 
Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...
 
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
 

More from Nisha Menon K (10)

High capacity optical
High capacity opticalHigh capacity optical
High capacity optical
 
non line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon knon line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon k
 
cognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon kcognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon k
 
Future of Wireless Technology
Future of Wireless TechnologyFuture of Wireless Technology
Future of Wireless Technology
 
Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat
 
Turbo equalization
Turbo equalizationTurbo equalization
Turbo equalization
 
Securing underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KSecuring underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon K
 
Noise models presented by Nisha Menon K
Noise models presented by Nisha Menon KNoise models presented by Nisha Menon K
Noise models presented by Nisha Menon K
 
Femtocells
FemtocellsFemtocells
Femtocells
 
Skinput
SkinputSkinput
Skinput
 

Recently uploaded

Recently uploaded (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

unified threat management by Nisha Menon K

  • 1. UNIFIED THREAT MANAGEMENT NISHA MENON K ROLL NO: 16 M-TECH COMMUNICATION ENGINEERING 12/23/2013 1
  • 2. OUTLINE  INTRODUCTION  THREATS  FEATURES OF UTM  TYPES OF UTM  ADVANTAGES  DISADVANTAGES  NEXT GENERATION UTM  CONCLUSION 12/23/2013 2
  • 3. INTRODUCTION Unified threat management (UTM) is a comprehensive solution that has recently emerged in the network security industry. . A Unified Threat Management (UTM) can simplify management of security strategy, with just one device taking the place of multiple layers of legacy security hardware and software. Additionally, UTM security solutions can be monitored and configured from a single, centralized management console. 12/23/2013 3
  • 5. Why UTM?? • UTM solutions emerged of the need to stem the increasing number of attacks on corporate information systems via hacking/cracking, viruses, worms - mostly an outcome of blended threats and insider threats. • Firms have been increasingly falling victim to attacks from cyber hackers. • Traditional security solutions which evolved to tackle specific threats are usually more difficult to deploy, manage and update. This increases operational complexities and overhead costs. • Today's organizations demand an integrated approach to network security and productivity that combines the features of traditional technologies with the streamlined ease of use of UTM 12/23/2013 5
  • 6.  UTM typically includes a firewall, antivirus software, content filtering and a spam filter in a single integrated package. Content filtering Firewall Antivirus 12/23/2013 6
  • 8. Spyware/Adware  Spyware is any software that utilizes a computer’s Internet access without the host’s knowledge or explicit permission  Approximately 90% of computers have some form of Spyware.  Aids in gathering information:    12/23/2013 Browsing habits (sites visited, links clicked, etc.) Data entered into forms (including account names, passwords, text of Web forms and Web-based email, etc.) Key stokes and work habits 8
  • 9. Application Attacks  Unpatched Servers:  Servers do not get up to date Buffer Overflow patches Malicious Hacker  Attacker sends malicious code through a buffer overflow  Server is infected  New users who access server get infected 12/23/2013 9
  • 10. File Based Threats  Example: Internet download  Viruses and malicious code File Server infection:  Peer to Peer Corp Network  Instant Messaging apps  Shareware sites  Compromised servers  Legitimate corporations  Web based email  Threats pass through firewalls  Once inside the network, others are easily affected 12/23/2013 10
  • 11. E-mail Viruses  E-mail has become the primary Corp Network means for distributing threats  Trojans are easy to deliver and install  HTML viruses (no user intervention) with webmail  E-mails with attachments containing:  java scripts and html scripts 12/23/2013 11
  • 12. FEATURES OF UTM FIREWALL INSPECTION INTRUSION PREVENTION URL FILTERING ANTI-VIRUS ANTI-SPAM VIRTUAL PRIVATE NETWORK 12/23/2013 12
  • 13. • FIREWALL INSPECTION • A system designed to prevent unauthorized access to or from a private network • Firewalls can be implemented in both hardware and software, or a combination of both. 12/23/2013 13
  • 14. • INTRUSION PREVENTION • Intrusion prevention systems (IPS), also known as intrusion detection and prevention systems (IDPS) • Monitor network and/or system activities for malicious activity • Identify malicious activity, log information about this activity, attempt to block/stop it, and report it 12/23/2013 14
  • 15. • URL FILTERING URL filtering is strictly a client protection technology of UTM. It can be used for both providing policy enforcement, such as limiting access to what sites different users can access based on category and organizational policy, as well as to act as another layer of security by limiting access to potentially malicious sites. 12/23/2013 15
  • 16. • ANTI-SPAM • Unwanted e-mail messages, usually sent by commercial, malicious, or fraudulent entities . • The anti-spam feature examines transmitted e-mail messages to identify spam. • When the device detects a message seemed to be spam, it blocks the e-mail message. 12/23/2013 16
  • 17. • ANTI VIRUS The UTM Appliance AntiVirus feature handles the detection and removal of viruses. 12/23/2013 17
  • 18. • VPN (VIRTUAL PRIVATE NETWORK) Used to connect two or more private networks via the internet •Provides an encrypted tunnel between the two private networks •Usually cheaper than a private leased line •Once established and as long as the encryption remains secure the VPN is impervious to exploitation 12/23/2013 18
  • 19. STANDARD - UTM  Unified Threat Management  Integration of • Firewall • Intrusion Prevention for blocking network threats • Anti-Virus for blocking file based threats • Anti-Spyware for blocking Spyware  Faster updates to the dynamic changing threat environment and elimination of False Positives 12/23/2013 19
  • 20. Integrated Threat Protection in Action Error message: “Drops” copy of itself on system and attempts to propagate “Innocent” Video Link: Redirects to malicious Website “Out of date” Flash player error: “Download” malware file Solution: Integrated Web Filtering Blocks access to malicious Website Network Antivirus Blocks download of virus Intrusion Protection Blocks the spread of the worm 12/23/2013 20
  • 22. ADVANTAGES • REDUCED COMPLEXITY: Single security solution. • SIMPLICITY : Avoidance of multiple software installation and maintenance • EASY MANAGEMENT • LOW OPERATOR INTERACTION • EASY TO TROUBLESHOOT 12/23/2013 22
  • 23. DISADVANTAGES o Single point of failure for network traffic o Single point of compromise if the UTM has vulnerabilities o Potential impact on latency and bandwidth when the UTM cannot keep up with the traffic 12/23/2013 23
  • 24. NEXT GENERATION - UTM Identity-based UTM: provide discrete identity information of each user in the network along with network log data. They allow creation of identity-based network access policies for individual users, delivering complete visibility and control on the network activities. Voice Over IP security Instant Messaging Worm protection Expanded security security to every corner of an organization’s network, from the core to the perimeter and every point in between. 12/23/2013 24
  • 25. CONCLUSION • UTM is answer to new challenges in the “wild” Internet • UTM is integrated solution with easy management • UTM offers complete support for all users, whether they are at an enterprise site or in between network zones-ensuring maximum protection 12/23/2013 25
  • 26. REFERENCE [1] Ranjit Shrirang Nimbalkar , Dr. B. B. Meshram “Survey on Integrated Management” International Journal of Engineering Research & Technology (IJERT), Vol. 2, Issue 6, June - 2013 [2] U.R.Naik and P.R.Chandra, “Designing Highperformance Networking Applications,” Intel Press, 2004. 12/23/2013 26