Unified Threat Management Device Roundup

Review by Enex TestLab

Cyber-attacks are constantly evolving and the attack methods used are constantly adapting. In a similar way, the traditional layers of defence have grown increasingly complex and interrelated. The convergence of security technologies to a single appliance; the Unified Threat Management (UTM) device is a logical approach and can go a long way towards managing security in most organisations.

A typical UTM device offers far more than just firewall functionality. A good UTM device is extremely valuable on many levels. They can help prevent end-users from accessing inappropriate web sites, by using inbuilt URL filters. UTMs can aid employee productivity by limiting internet access and enforcing the business’s usage policy. They can help prevent malware outbreaks by scanning and blocking suspicious content at the gateway. They can help stop spam email from reaching end users. They can provide a Virtual Private Network (VPN) tunnel for secure communications between separate business sites, and can enable secure connections to trusted third parties such as out-of-office employees, customers and partners.

A properly configured UTM device helps ensure the inadvertent actions of their employees or deliberate activities of attackers is controlled. In the on-going game of cat and mouse between cyber-attacker and corporate defender, UTM devices are a powerful weapon.

In this review we’ll be providing an overview of the features and functionality of five commercially available UTM devices. We’ll put each device through its paces, testing the firewall components and taking a close look at their security configurations.

How We Tested

This review concentrates on the core functionality offered by each device. We tested five devices that are marketed towards small-to-medium enterprises.

  • Astaro Security Gateway 110
  • Check Point Safe@Office 1000N
  • Netgear ProSecure UTM 50
  • SonicWall NSA240
  • WatchGuard XTM 810

Firstly, each UTM device was deployed in typical way, by connecting each device simultaneously to the internet and a protected internal network. Client and server machines were set up on the newly protected network, they were given free rein to access the public internet. Our main aim was to accurately represent a (basic) real-world environment.

Secondly, each UTM device was examined in detail - inside and out. We performed a thorough TCP network scan (covering all ports; 0 to 65535 inclusive) over the internet to get a realistic attacker perspective. We then conducted a full TCP port scan on the protected internal interface to discover which ports were open or detectable from the LAN. It should be noted that evasion, stealth, and UDP scanning techniques were considered out of scope in this review due to time limitations and to avoid any false positive results.

Finally, we applied custom outbound firewall rules to test the accuracy of the devices’ outbound security policies.

Join the CSO newsletter!

Error: Please check your email address.

Tags content filteringUniied Threat Management (UTM)CheckPoint Safe@Office 1000NNetgear ProSecure UTM 50vpnfirewallUTM devicesAstaro Security Gateway 110WatchGuard XTM 810UTM solutionsSonicWall NA240anti-virus

More about ASG GroupAstaroCFSCheck Point Software TechnologiesCheck Point Software TechnologiesDPIEnex TestLabeSecurityetworkGatewayGatewayIntelIntrusionLANNetgear AustraliaNintendo AustraliaNSASECSonicWallSSHWatchguardWatchguard

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Enex Testlab

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts