A Study On Unified Threat Management (Utm)

Research Article
Mr. Ravindranath Mukhi, and Abhijit S Desai
DOI: 
http://dx.doi.org/10.24327/ijrsr.2019.1005.3426
Subject: 
science
KeyWords: 
Network security, Chief Information Security Officer (CISO) , Unified ThreatManagement (UTM), Web Filtering
Abstract: 

Unified threat management also abbreviated as UTM, is an approach to information or data security where multiple security threats or functions can be solved by a single capable security solution on the network.[1]43% of the 1,519 UK businesses that participated in the 2018 Cyber Security Breaches Survey from the Department for Digital, Culture, Media and Sport (DCMS) found that these businesses had experienced a cyber attack or security breach. The most prominent reason for the industry to be pushing towards unified threat management (UTM) is fines for major data breaches resulting in data loss and data tampering. The General Data Protection Regulation (GDPR) has driven several chief information security officers (CISOs) to re-evaluate their security posture. Organisations may have to face fines of 4% of their global turnover under the new data regulation, that was established in May 2018.According to Peter Wenham (Member of BCS Security community of expertise), UTM systems can help reduce the threats that could lead to a breach. [2]