Compliance Management, Critical Infrastructure Security, Privacy, Security Strategy, Plan, Budget

UTM: Global DataGuard

Share

Sometimes a different approach is needed. The notion of the UTM was developed from the need to consolidate point solutions. There are a lot of problems, of course. They cost more to buy and manage, they use more power and they need a sophisticated staff to manage them. On the other hand, point solutions offer a solution to the dual problems of single point of failure and loss of defense-in-depth. Enter the UTM. And UTMs are becoming commoditized, just as are many other product types. So, how do you stand out from the crowd?

You answer one important question that has nothing to do with power, resources or staffing: How do you connect the dots to do really good security in the face of multiple problems? The answer: You solve relatively minor problems of single point of failure (redundancy with failover) and defense-in-depth (rethink the security architecture to provide protection at multiple points – from the perimeter to the desktop). And then move on to the big one: correlation.

Global DataGuard has addressed the challenge head on. They have developed an architecture that is designed from the ground up to collect and correlate a wide variety of threat data. This requires peer-level sharing of data and is built on a foundation of network behavioral analysis.

They correlate threat data based not just on a single enterprise, but across an ecosystem of other users of their products (requires opt-in by users who are willing to share data). They also back up every customer with managed services so that every customer has the availability of on-demand managed services to back up limited staff.

Global DataGuard believes that most UTMs are not really industrial strength. So they have designed their products based on years of providing managed services. They also offer two versions: a single appliance and the same architecture in multiple boxes. That allows nearly unlimited scalability. Finally, they build in adaptive-predictive capabilities to help ensure that the customer stays ahead of threats.

All of this innovation is possible because of the foundational innovation: a purpose-built architecture that allows scalable threat analysis backed up by managed services.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds