The World's First UTM Firewall to Feature Vulnerability Assessment and Scanning at the Same Time

July 27, 2013 (PRLEAP.COM) Technology News
The IT security company has already taken UTM appliances above and beyond what previous UTM products… whether they're in equipment form or software… have achieved. Fairly recently, SecPoint UTM became lighter and more affordable than ever before for the sake of SME use. This time around, their utilities have been further expanded to allow for assessment that further assists in actual scanning.

One could truly manage threats in a unified manner by conducting vulnerability assessment before undergoing a vulnerability scan in only one device. This is an important development because doing a vulnerability assessment prior to scanning serves as the scan's guide towards a more thorough and meticulous scan and penetration test at the same time. This intrinsic two-way feature is available to both versions of the SecPoint Protector, which is the regular "parent" and includes all the same award-winning attributes such as firewall, intrusion detection, and prevention of threats. A UTM couldn't truly be considered a UTM unless it incorporates absolutely everything in its quest to manage threats.

It makes sense that the firewall and threat manager acquires further detection advancements that truly gives systems a thorough sweeping of sorts on top of all the Content Filter, Anti-Phishing, Antivirus, Anti-Spam, Web Filtering, and Application Control that both versions of the Protector currently offer. Although one might believe that a vulnerability scan is enough to handle all cases of code flaw problems, having an assessment before the scan is actually akin to mapping out a proper route prior to traveling. It cuts down on significantly on wasted scanning time because the assessment portion of the examination has already provided a "route" of sorts for the scan to travel, like an already treaded path in a vast labyrinth of sorts.

The bottom line here is that UTM entails absolute protection in all fronts, and the Protector from SecPoint upholds this concept with the incorporation of two distinct attributes into one hardware device for the first time since the conceptualization of UTM. The Protector already handles content management on the administrator level, so it makes sense that Vulnerability Assessment and Vulnerability Scanning be added to the UTM Firewall and Threat Manager as a means to make absolutely sure that the content being managed and filtered is also free of crippling, exploitable bugs and code flaws.

Protector UTM Firewall Image: http://www.secpoint.com/newimages3/Protector-P1200-2-Web.jpg

SecPoint Logo: http://www.secpoint.com/logo/SecPointLogo.jpg

For a more in-depth look at SecPoint Protector, please visit the http://www.secpoint.com/protector page costs about 799 USD or 599 Euro, including the unit's hardware box. The price for the device is an all-inclusive one; no module is left behind.

as well as the http://www.secpoint.com website.