UTM: Global DataGuard

UTM: Global DataGuard
UTM: Global DataGuard

Sometimes a different approach is needed. The notion of the UTM was developed from the need to consolidate point solutions. There are a lot of problems, of course. They cost more to buy and manage, they use more power and they need a sophisticated staff to manage them. On the other hand, point solutions offer a solution to the dual problems of single point of failure and loss of defense-in-depth. Enter the UTM. And UTMs are becoming commoditized, just as are many other product types. So, how do you stand out from the crowd?

You answer one important question that has nothing to do with power, resources or staffing: How do you connect the dots to do really good security in the face of multiple problems? The answer: You solve relatively minor problems of single point of failure (redundancy with failover) and defense-in-depth (rethink the security architecture to provide protection at multiple points – from the perimeter to the desktop). And then move on to the big one: correlation.

Global DataGuard has addressed the challenge head on. They have developed an architecture that is designed from the ground up to collect and correlate a wide variety of threat data. This requires peer-level sharing of data and is built on a foundation of network behavioral analysis.

They correlate threat data based not just on a single enterprise, but across an ecosystem of other users of their products (requires opt-in by users who are willing to share data). They also back up every customer with managed services so that every customer has the availability of on-demand managed services to back up limited staff.

Global DataGuard believes that most UTMs are not really industrial strength. So they have designed their products based on years of providing managed services. They also offer two versions: a single appliance and the same architecture in multiple boxes. That allows nearly unlimited scalability. Finally, they build in adaptive-predictive capabilities to help ensure that the customer stays ahead of threats.

All of this innovation is possible because of the foundational innovation: a purpose-built architecture that allows scalable threat analysis backed up by managed services.

close

Next Article in Features

More in Features

Behind the scenes: Privacy and data-mining

Behind the scenes: Privacy and data-mining

With data-mining firms harvesting personal information from online activity, privacy advocates, if not yet consumers, are alarmed, reports James Hale.

The great divide: Reforming the CFAA

The great divide: Reforming the CFAA

Aaron Swartz's death inspired Rep. Zoe Lofgren to want to reform the federal anti-hacking law, but some security pros worry this would sterilize a potent enforcement weapon, reports Dan Kaplan.

Suspect everything: Advanced threats in the network

Suspect everything: Advanced threats in the network

Are there ways to catch sophisticated malware that hides in trusted processes and services? Deb Radcliff finds out.