Unified Threat Management

You don’t need me to tell you that realistically testing a Unified Threat Manager (UTM) can be a nightmare. The convergence that is happening on so many fronts offers a utopian future of lower OPEX and streamlined services, all great for the bottom line. But under the hood, the dirty little secret is a more-than-compensating increase in complexity, and security solutions are not exempt.

A UTM squeezes multiple security functions, including content filtering, spam filtering, intrusion detection, anti-virus protection, security and policy management, into a single box. But whether it takes up a whole rack or one box, somebody has to make sure it actually (and efficiently) does what it’s supposed to do. And that somebody is you.

You need a tool that tells you if your system keeps the bad guys out while letting the good guys get their work done. You want to know if it will pass through traffic with minimum delay and loss while stopping threats and enforcing class of service and usage rules. And, if possible, you’d like to find that out without going crazy trying to recreate a realistic environment or going blind trying to correlate the results to see what they mean. Talk about a nightmare.

The ideal UTM test system would:

1. Save time by generating threats along with safe traffic like VOIP, P2P, C IFS, and real MPEG4 video (from the same port at the same time)

2. Deliver the horsepower to scale at all protocol layers in all the dimensions that matter, like threats per second, sessions per second, SSL sessions per second, and concurrent connections. But these sessions have to be real – no fake TCP stacks, please! You know what I’m talking about here ;-)

3. Be controllable from a single GUI for fast and accurate test setup, and if I want to get scriptable I want at a minimum automatic script generation, and ideally, integration with leading test frameworks

Guess what? Spirent has the only UTM test solution that brings all that to the table in a way I’d like. Of course you expected me to say that, but seriously, integrated threats and protocols on both IPv6 and IPv4, with a single GUI, correlated results in a single blade on a flexible chassis-based architecture hasn't existed until now.

The combination delivers unprecedented test realism with the scalability and performance required for the job.

What’s that mean for you?

  • Reduced time-to-test. Less setup, less waiting, more combined results in a single test run.
  • More realistic testing with real TCP stacks and user behavior that catches real problems without reporting time-wasting false positives
  • Integrated results for better interpretation of what is going on the network
  • A more reliable solution

That’s right. The nightmare is over. 

comments powered by Disqus
× Spirent.com uses cookies to enhance and streamline your experience. By continuing to browse our site, you are agreeing to the use of cookies.