netcmh
asked on
UTM & DLP
Hello,
We're planning on moving to a consolidated threat managment solution in the near future.
We have the following:
Blue Coat ProxySG server
Websense Whitelisting appliance
Code Green DLP (Data Leakage Prevention) appliance
Symantec Spam Email Gateway
The Intrusion Prevention System components of the Cisco ASA firewalls
The BotNet filter components of the Cisco ASA firewalls
What UTM out there would help me consolidate all of the above?
I have looked at Checkpoint, PA and Fortinet. The webfilter, antimalware, IPS components are easily available in all. The antispam and DLP components are not as robust as in a full appliance dedicated for just that one purpose. That is my research so far.
I'm looking for an all in one solution with HA. Any light on the subject would be appreciated.
Thanks
We're planning on moving to a consolidated threat managment solution in the near future.
We have the following:
Blue Coat ProxySG server
Websense Whitelisting appliance
Code Green DLP (Data Leakage Prevention) appliance
Symantec Spam Email Gateway
The Intrusion Prevention System components of the Cisco ASA firewalls
The BotNet filter components of the Cisco ASA firewalls
What UTM out there would help me consolidate all of the above?
I have looked at Checkpoint, PA and Fortinet. The webfilter, antimalware, IPS components are easily available in all. The antispam and DLP components are not as robust as in a full appliance dedicated for just that one purpose. That is my research so far.
I'm looking for an all in one solution with HA. Any light on the subject would be appreciated.
Thanks
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
ASKER
Thank you all for your inputs. I know and understand that putting all my eggs in one basket is asking for it. The antispam and DLP components are most pressing for me in the UTM arena.
Which UTM would have the best of these 2 components playing well with the other blades?
I understand that a blade will not be able to take over the functionality of an appliance, but I'm specifically looking for a solution that leverages the DB we have with PII in assessing what is allowed out and what is not.
Which UTM would have the best of these 2 components playing well with the other blades?
I understand that a blade will not be able to take over the functionality of an appliance, but I'm specifically looking for a solution that leverages the DB we have with PII in assessing what is allowed out and what is not.
I've requested that this question be closed as follows:
Accepted answer: 500 points for richrumble's comment #a39639106
for the following reason:
This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.
Accepted answer: 500 points for richrumble's comment #a39639106
for the following reason:
This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.
ASKER
I was hoping for more input, but since none came I'm closing the question and awarding points to the best answers for me.
SonicWall www.sonicwall.com
Juniper www.juniper.net
Cisco www.cisco.com
WatchGate www.watchguard.com
CheckPoint www.checkpoint.com
Fortinet www.fortinet.com
Cyberroam www.cyberoam.com
SmoothWall www.smoothwall.net
zyWALL www.zyxel.com
Untangle www.untangle.com
astaro www.astaro.com
ClearOS www.clearfoundation.com
PF www.pfsense.org
WALL m0n0.ch/wall
IPCop ipcop.org
I would check fortigate
http://www.fortinet.com/products/fortigate/index.html
As said, don't assume that technology will solve all know threats around data loss, because it wont. Technology solutions are only part of the story of DLP, IT Staff and CTO's are required that they understand the threats and how they work. knowledge of attack methods and IT vulnerbilities in the organisation are more important than knowing who is behind attacks or why, inside http://searchsecurity.techtarget.com/ you ll find good docs about Security and DLP.
This white paper discusses how this new DLP model aligns data discovery, classification, policy management, and security controls to your business requirements and processes.
http://okt.to/d5mG4E