What is UTM?

What is UTM?

am 03.12.2006 15:09:16 von panda

What is UTM?

UTM stands for Unified Threat Management, which is more than 2 years
old term in Internet Security, this term was first created by IDC.

In short:

Gone are the days when a dedicated firewall is sufficient to fend off
hackers from corporate networks, Unified Threat Management (UTM) is an
emerging trend in the network security appliance market. This evolution

introduces a new all-in-one network security device that provides:

1Anti-virus
2Anti-spam
3Content filtering
4Intrusion detection and prevention.
5Firewall

You can also find traffic shaping, VPN, Virtual Domain and even web
proxy caching in some UTM boxes like ASTARO.

www.networkingland.com/utm_vendors.htm

Now you can get one UTM box like FG-50A from Fortinet at less than
$1000 with one year service contract which fits even small budgets.

www.networkingland.com/utm_shopping.htm

In the past these services, traditionally, used to be handled by
multiple systems and only large biz can afford to have.


Naim=20

www.networkingland.com

Reply =BB

Re: What is UTM?

am 03.12.2006 17:36:59 von alf

Panda wrote:
> What is UTM?

I'm home user with a limited knowladge and I'm not very familiar with
UTM. Recently I tried to "fix" several zombies. The thing they had was
using uPnP to forward port and reconfigure router firewall, Rootkit and
process infection was succesfull in beating software firewalls, AV,
anti-spam softvare and rootkit revealers. Pracitcally nothing was
preventing zombie to operate. User was become aware that something is
wrong after his/her ISP has locked his/her account becouse of sending spam.

Now, I'm interested is UTM has uPnP or similar interface for
auto-configuration (unexperienced users). Could "the thing" reconfigure
it in a same way as it reconfigured uPnP capable NAT router with
built-in firewall? For example by turning off it's features or configure
it in a way that malicius traffic is allowed without warnning (for
example by adding exceptions to UTM box by uPnP)?

Enyone has experience in working with UTM? If it cannot be reconfigured
by uPnP or similar with "the thing" in a way that zombie start to
operate without warnning, this might be interesting security solution
that actually does some work. Well, zombie machine still have to be
flatten and rebuilt but no damage to other internet users is done
(zombie is unoperational -> no spam -> no rootkit/virus dispatching).

Note that unexperienced users work as Administrators and they are very
often familiar only with IE, OE, Word/Excel and of course Solitare. So
please don't tell me something like you don't need UTM, update and
configure OS and watch what sites you are visting, and what you are
running. I know that I keep uPnP off and configure router myself, I work
as a limited user on Windows/Linux etc. etc. but not every home user is
like me.

Re: What is UTM?

am 03.12.2006 18:17:26 von alf

And I forgot.

What OS/software is used in UTM box, and what protect that OS/software
from being attacked or exploited?

Re: What is UTM?

am 04.12.2006 15:22:46 von panda

Hi,

UTM is not a removal or fixing tool! it's an appliance with one side
hooked to the Internet and the other side to you LAN where it will
prevent all known Internet threats from reaching and harming your
computers.

Internet ------------- UTM appliance --------- LAN (PCs and Servers).

No need for any software piece or agent to be installed in each PC or
server in you Local Area Network (LAN).

You can still get personel software copies of UTM from Vendors like
FORTINET under the name Forti Client I guess.

As for removing sticky programs from your computer, you can still try
this FREE Stratup tool: www.mlin.net it's very simple and powerfull.


Naim
www.networkingland.com



@lf wrote:
> Panda wrote:
> > What is UTM?
>
> I'm home user with a limited knowladge and I'm not very familiar with
> UTM. Recently I tried to "fix" several zombies. The thing they had was
> using uPnP to forward port and reconfigure router firewall, Rootkit and
> process infection was succesfull in beating software firewalls, AV,
> anti-spam softvare and rootkit revealers. Pracitcally nothing was
> preventing zombie to operate. User was become aware that something is
> wrong after his/her ISP has locked his/her account becouse of sending spam.
>
> Now, I'm interested is UTM has uPnP or similar interface for
> auto-configuration (unexperienced users). Could "the thing" reconfigure
> it in a same way as it reconfigured uPnP capable NAT router with
> built-in firewall? For example by turning off it's features or configure
> it in a way that malicius traffic is allowed without warnning (for
> example by adding exceptions to UTM box by uPnP)?
>
> Enyone has experience in working with UTM? If it cannot be reconfigured
> by uPnP or similar with "the thing" in a way that zombie start to
> operate without warnning, this might be interesting security solution
> that actually does some work. Well, zombie machine still have to be
> flatten and rebuilt but no damage to other internet users is done
> (zombie is unoperational -> no spam -> no rootkit/virus dispatching).
>
> Note that unexperienced users work as Administrators and they are very
> often familiar only with IE, OE, Word/Excel and of course Solitare. So
> please don't tell me something like you don't need UTM, update and
> configure OS and watch what sites you are visting, and what you are
> running. I know that I keep uPnP off and configure router myself, I work
> as a limited user on Windows/Linux etc. etc. but not every home user is
> like me.

Re: What is UTM?

am 04.12.2006 21:34:08 von Bogwitch

Hi Naim, or Panda,

Your response raises a few more questions, and failed to answer the
majority of questions posed by @lf.

My questions, from your response are:

How does it 'prevent' all known Internet threats from reaching and
harming my computers? Exactly what threats does it block? ALL of them?
That's a bold claim...

How does it cope with unknown threats?

How does it keep up-to-date? There are new threats arising daily.

It sounds as though the UTM device is acting just like my router
firewall, which was provided free by my ISP. Is there much of a
difference? Why would I buy the UTM device?

I look forward to your answer,

Bogwitch

"Panda" wrote in message
news:1165242166.272277.232300@j72g2000cwa.googlegroups.com.. .
> Hi,
>
> UTM is not a removal or fixing tool! it's an appliance with one side
> hooked to the Internet and the other side to you LAN where it will
> prevent all known Internet threats from reaching and harming your
> computers.
>
> Internet ------------- UTM appliance --------- LAN (PCs and Servers).
>
> No need for any software piece or agent to be installed in each PC or
> server in you Local Area Network (LAN).
>
> You can still get personel software copies of UTM from Vendors like
> FORTINET under the name Forti Client I guess.
>
> As for removing sticky programs from your computer, you can still try
> this FREE Stratup tool: www.mlin.net it's very simple and powerfull.
>
>
> Naim
> www.networkingland.com
>
>
>
> @lf wrote:
> > Panda wrote:
> > > What is UTM?
> >
> > I'm home user with a limited knowladge and I'm not very familiar
with
> > UTM. Recently I tried to "fix" several zombies. The thing they had
was
> > using uPnP to forward port and reconfigure router firewall, Rootkit
and
> > process infection was succesfull in beating software firewalls, AV,
> > anti-spam softvare and rootkit revealers. Pracitcally nothing was
> > preventing zombie to operate. User was become aware that something
is
> > wrong after his/her ISP has locked his/her account becouse of
sending spam.
> >
> > Now, I'm interested is UTM has uPnP or similar interface for
> > auto-configuration (unexperienced users). Could "the thing"
reconfigure
> > it in a same way as it reconfigured uPnP capable NAT router with
> > built-in firewall? For example by turning off it's features or
configure
> > it in a way that malicius traffic is allowed without warnning (for
> > example by adding exceptions to UTM box by uPnP)?
> >
> > Enyone has experience in working with UTM? If it cannot be
reconfigured
> > by uPnP or similar with "the thing" in a way that zombie start to
> > operate without warnning, this might be interesting security
solution
> > that actually does some work. Well, zombie machine still have to be
> > flatten and rebuilt but no damage to other internet users is done
> > (zombie is unoperational -> no spam -> no rootkit/virus
dispatching).
> >
> > Note that unexperienced users work as Administrators and they are
very
> > often familiar only with IE, OE, Word/Excel and of course Solitare.
So
> > please don't tell me something like you don't need UTM, update and
> > configure OS and watch what sites you are visting, and what you are
> > running. I know that I keep uPnP off and configure router myself, I
work
> > as a limited user on Windows/Linux etc. etc. but not every home user
is
> > like me.
>

Re: What is UTM?

am 05.12.2006 11:47:00 von panda

Hi Bogwitch,

UTM appliance is not a static device like Routers or Wireless Access
Points.
You have to register your machine to the Vendor support center and it
can be programed
( every day or even every hour) to upload the latest protection
software including new threats prevention from that center.

www.networkingland.com/utm_technology.htm

Most UTM appliances come with FREE trail service, but later on you have
to buy the service from your Vendor to have an active and living
machine.

Yes, it can protect hundreds or even thousands of PC and servers in
your LAN from Viruses, Spayware, Adware, bad contets, hacking and
Intrusion ..... in one BoX!

FORTINET - USA is leading this UTM market with over 180,000 units
shipped since 2002 while keeping their in-house service support.


Hope this answers raised questions!


Naim
www.networkingland.com







Bogwitch wrote:
> Hi Naim, or Panda,
>
> Your response raises a few more questions, and failed to answer the
> majority of questions posed by @lf.
>
> My questions, from your response are:
>
> How does it 'prevent' all known Internet threats from reaching and
> harming my computers? Exactly what threats does it block? ALL of them?
> That's a bold claim...
>
> How does it cope with unknown threats?
>
> How does it keep up-to-date? There are new threats arising daily.
>
> It sounds as though the UTM device is acting just like my router
> firewall, which was provided free by my ISP. Is there much of a
> difference? Why would I buy the UTM device?
>
> I look forward to your answer,
>
> Bogwitch
>
> "Panda" wrote in message
> news:1165242166.272277.232300@j72g2000cwa.googlegroups.com.. .
> > Hi,
> >
> > UTM is not a removal or fixing tool! it's an appliance with one side
> > hooked to the Internet and the other side to you LAN where it will
> > prevent all known Internet threats from reaching and harming your
> > computers.
> >
> > Internet ------------- UTM appliance --------- LAN (PCs and Servers).
> >
> > No need for any software piece or agent to be installed in each PC or
> > server in you Local Area Network (LAN).
> >
> > You can still get personel software copies of UTM from Vendors like
> > FORTINET under the name Forti Client I guess.
> >
> > As for removing sticky programs from your computer, you can still try
> > this FREE Stratup tool: www.mlin.net it's very simple and powerfull.
> >
> >
> > Naim
> > www.networkingland.com
> >
> >
> >
> > @lf wrote:
> > > Panda wrote:
> > > > What is UTM?
> > >
> > > I'm home user with a limited knowladge and I'm not very familiar
> with
> > > UTM. Recently I tried to "fix" several zombies. The thing they had
> was
> > > using uPnP to forward port and reconfigure router firewall, Rootkit
> and
> > > process infection was succesfull in beating software firewalls, AV,
> > > anti-spam softvare and rootkit revealers. Pracitcally nothing was
> > > preventing zombie to operate. User was become aware that something
> is
> > > wrong after his/her ISP has locked his/her account becouse of
> sending spam.
> > >
> > > Now, I'm interested is UTM has uPnP or similar interface for
> > > auto-configuration (unexperienced users). Could "the thing"
> reconfigure
> > > it in a same way as it reconfigured uPnP capable NAT router with
> > > built-in firewall? For example by turning off it's features or
> configure
> > > it in a way that malicius traffic is allowed without warnning (for
> > > example by adding exceptions to UTM box by uPnP)?
> > >
> > > Enyone has experience in working with UTM? If it cannot be
> reconfigured
> > > by uPnP or similar with "the thing" in a way that zombie start to
> > > operate without warnning, this might be interesting security
> solution
> > > that actually does some work. Well, zombie machine still have to be
> > > flatten and rebuilt but no damage to other internet users is done
> > > (zombie is unoperational -> no spam -> no rootkit/virus
> dispatching).
> > >
> > > Note that unexperienced users work as Administrators and they are
> very
> > > often familiar only with IE, OE, Word/Excel and of course Solitare.
> So
> > > please don't tell me something like you don't need UTM, update and
> > > configure OS and watch what sites you are visting, and what you are
> > > running. I know that I keep uPnP off and configure router myself, I
> work
> > > as a limited user on Windows/Linux etc. etc. but not every home user
> is
> > > like me.
> >

Re: What is UTM?

am 05.12.2006 13:10:29 von Bogwitch

Hi Naim, or Panda,

So, is the UTM device signature based, or address based?

If it blocks ALL malware, does that make my Anti-virus/ anti-spyware/
anti-adware software redundant? My company would want to make a cost saving,
you see.

Again, can you tell me if there is any protection afforded by the UTM box to
UNKNOWN malware?

Thanks,

Bogwitch.

PS, with the marketing stats, etc. included in your post, it is starting to
sound a lot like spam.

"Panda" wrote in message
news:1165315620.614412.111890@80g2000cwy.googlegroups.com...
> Hi Bogwitch,
>
> UTM appliance is not a static device like Routers or Wireless Access
> Points.
> You have to register your machine to the Vendor support center and it
> can be programed
> ( every day or even every hour) to upload the latest protection
> software including new threats prevention from that center.
>
> www.networkingland.com/utm_technology.htm
>
> Most UTM appliances come with FREE trail service, but later on you have
> to buy the service from your Vendor to have an active and living
> machine.
>
> Yes, it can protect hundreds or even thousands of PC and servers in
> your LAN from Viruses, Spayware, Adware, bad contets, hacking and
> Intrusion ..... in one BoX!
>
> FORTINET - USA is leading this UTM market with over 180,000 units
> shipped since 2002 while keeping their in-house service support.
>
>
> Hope this answers raised questions!
>
>
> Naim
> www.networkingland.com
>
>
>
>
>
>
>
> Bogwitch wrote:
> > Hi Naim, or Panda,
> >
> > Your response raises a few more questions, and failed to answer the
> > majority of questions posed by @lf.
> >
> > My questions, from your response are:
> >
> > How does it 'prevent' all known Internet threats from reaching and
> > harming my computers? Exactly what threats does it block? ALL of them?
> > That's a bold claim...
> >
> > How does it cope with unknown threats?
> >
> > How does it keep up-to-date? There are new threats arising daily.
> >
> > It sounds as though the UTM device is acting just like my router
> > firewall, which was provided free by my ISP. Is there much of a
> > difference? Why would I buy the UTM device?
> >
> > I look forward to your answer,
> >
> > Bogwitch
> >
> > "Panda" wrote in message
> > news:1165242166.272277.232300@j72g2000cwa.googlegroups.com.. .
> > > Hi,
> > >
> > > UTM is not a removal or fixing tool! it's an appliance with one side
> > > hooked to the Internet and the other side to you LAN where it will
> > > prevent all known Internet threats from reaching and harming your
> > > computers.
> > >
> > > Internet ------------- UTM appliance --------- LAN (PCs and Servers).
> > >
> > > No need for any software piece or agent to be installed in each PC or
> > > server in you Local Area Network (LAN).
> > >
> > > You can still get personel software copies of UTM from Vendors like
> > > FORTINET under the name Forti Client I guess.
> > >
> > > As for removing sticky programs from your computer, you can still try
> > > this FREE Stratup tool: www.mlin.net it's very simple and powerfull.
> > >
> > >
> > > Naim
> > > www.networkingland.com
> > >
> > >
> > >
> > > @lf wrote:
> > > > Panda wrote:
> > > > > What is UTM?
> > > >
> > > > I'm home user with a limited knowladge and I'm not very familiar
> > with
> > > > UTM. Recently I tried to "fix" several zombies. The thing they had
> > was
> > > > using uPnP to forward port and reconfigure router firewall, Rootkit
> > and
> > > > process infection was succesfull in beating software firewalls, AV,
> > > > anti-spam softvare and rootkit revealers. Pracitcally nothing was
> > > > preventing zombie to operate. User was become aware that something
> > is
> > > > wrong after his/her ISP has locked his/her account becouse of
> > sending spam.
> > > >
> > > > Now, I'm interested is UTM has uPnP or similar interface for
> > > > auto-configuration (unexperienced users). Could "the thing"
> > reconfigure
> > > > it in a same way as it reconfigured uPnP capable NAT router with
> > > > built-in firewall? For example by turning off it's features or
> > configure
> > > > it in a way that malicius traffic is allowed without warnning (for
> > > > example by adding exceptions to UTM box by uPnP)?
> > > >
> > > > Enyone has experience in working with UTM? If it cannot be
> > reconfigured
> > > > by uPnP or similar with "the thing" in a way that zombie start to
> > > > operate without warnning, this might be interesting security
> > solution
> > > > that actually does some work. Well, zombie machine still have to be
> > > > flatten and rebuilt but no damage to other internet users is done
> > > > (zombie is unoperational -> no spam -> no rootkit/virus
> > dispatching).
> > > >
> > > > Note that unexperienced users work as Administrators and they are
> > very
> > > > often familiar only with IE, OE, Word/Excel and of course Solitare.
> > So
> > > > please don't tell me something like you don't need UTM, update and
> > > > configure OS and watch what sites you are visting, and what you are
> > > > running. I know that I keep uPnP off and configure router myself, I
> > work
> > > > as a limited user on Windows/Linux etc. etc. but not every home user
> > is
> > > > like me.
> > >
>



--
Posted via a free Usenet account from http://www.teranews.com

Re: What is UTM?

am 06.12.2006 13:07:36 von panda

Hello Bogwitch,

All known and new viruses or worms signatures are stored in the machine
and will be pushed or updated from the Vendor service center.

Yes, your protection software will be redundant! but please keep in
mind you have to clean all LAN PCs and Servers before deploying any UTM
solution.

Some UTM boxes do provide protection to suspicious or UNKNOWN threats.

Hope this answers all you questions!

good luck!

Naim
www.networkingland.com




Bogwitch wrote:
> Hi Naim, or Panda,
>
> So, is the UTM device signature based, or address based?
>
> If it blocks ALL malware, does that make my Anti-virus/ anti-spyware/
> anti-adware software redundant? My company would want to make a cost saving,
> you see.
>
> Again, can you tell me if there is any protection afforded by the UTM box to
> UNKNOWN malware?
>
> Thanks,
>
> Bogwitch.
>
> PS, with the marketing stats, etc. included in your post, it is starting to
> sound a lot like spam.
>
> "Panda" wrote in message
> news:1165315620.614412.111890@80g2000cwy.googlegroups.com...
> > Hi Bogwitch,
> >
> > UTM appliance is not a static device like Routers or Wireless Access
> > Points.
> > You have to register your machine to the Vendor support center and it
> > can be programed
> > ( every day or even every hour) to upload the latest protection
> > software including new threats prevention from that center.
> >
> > www.networkingland.com/utm_technology.htm
> >
> > Most UTM appliances come with FREE trail service, but later on you have
> > to buy the service from your Vendor to have an active and living
> > machine.
> >
> > Yes, it can protect hundreds or even thousands of PC and servers in
> > your LAN from Viruses, Spayware, Adware, bad contets, hacking and
> > Intrusion ..... in one BoX!
> >
> > FORTINET - USA is leading this UTM market with over 180,000 units
> > shipped since 2002 while keeping their in-house service support.
> >
> >
> > Hope this answers raised questions!
> >
> >
> > Naim
> > www.networkingland.com
> >
> >
> >
> >
> >
> >
> >
> > Bogwitch wrote:
> > > Hi Naim, or Panda,
> > >
> > > Your response raises a few more questions, and failed to answer the
> > > majority of questions posed by @lf.
> > >
> > > My questions, from your response are:
> > >
> > > How does it 'prevent' all known Internet threats from reaching and
> > > harming my computers? Exactly what threats does it block? ALL of them?
> > > That's a bold claim...
> > >
> > > How does it cope with unknown threats?
> > >
> > > How does it keep up-to-date? There are new threats arising daily.
> > >
> > > It sounds as though the UTM device is acting just like my router
> > > firewall, which was provided free by my ISP. Is there much of a
> > > difference? Why would I buy the UTM device?
> > >
> > > I look forward to your answer,
> > >
> > > Bogwitch
> > >
> > > "Panda" wrote in message
> > > news:1165242166.272277.232300@j72g2000cwa.googlegroups.com.. .
> > > > Hi,
> > > >
> > > > UTM is not a removal or fixing tool! it's an appliance with one side
> > > > hooked to the Internet and the other side to you LAN where it will
> > > > prevent all known Internet threats from reaching and harming your
> > > > computers.
> > > >
> > > > Internet ------------- UTM appliance --------- LAN (PCs and Servers).
> > > >
> > > > No need for any software piece or agent to be installed in each PC or
> > > > server in you Local Area Network (LAN).
> > > >
> > > > You can still get personel software copies of UTM from Vendors like
> > > > FORTINET under the name Forti Client I guess.
> > > >
> > > > As for removing sticky programs from your computer, you can still try
> > > > this FREE Stratup tool: www.mlin.net it's very simple and powerfull.
> > > >
> > > >
> > > > Naim
> > > > www.networkingland.com
> > > >
> > > >
> > > >
> > > > @lf wrote:
> > > > > Panda wrote:
> > > > > > What is UTM?
> > > > >
> > > > > I'm home user with a limited knowladge and I'm not very familiar
> > > with
> > > > > UTM. Recently I tried to "fix" several zombies. The thing they had
> > > was
> > > > > using uPnP to forward port and reconfigure router firewall, Rootkit
> > > and
> > > > > process infection was succesfull in beating software firewalls, AV,
> > > > > anti-spam softvare and rootkit revealers. Pracitcally nothing was
> > > > > preventing zombie to operate. User was become aware that something
> > > is
> > > > > wrong after his/her ISP has locked his/her account becouse of
> > > sending spam.
> > > > >
> > > > > Now, I'm interested is UTM has uPnP or similar interface for
> > > > > auto-configuration (unexperienced users). Could "the thing"
> > > reconfigure
> > > > > it in a same way as it reconfigured uPnP capable NAT router with
> > > > > built-in firewall? For example by turning off it's features or
> > > configure
> > > > > it in a way that malicius traffic is allowed without warnning (for
> > > > > example by adding exceptions to UTM box by uPnP)?
> > > > >
> > > > > Enyone has experience in working with UTM? If it cannot be
> > > reconfigured
> > > > > by uPnP or similar with "the thing" in a way that zombie start to
> > > > > operate without warnning, this might be interesting security
> > > solution
> > > > > that actually does some work. Well, zombie machine still have to be
> > > > > flatten and rebuilt but no damage to other internet users is done
> > > > > (zombie is unoperational -> no spam -> no rootkit/virus
> > > dispatching).
> > > > >
> > > > > Note that unexperienced users work as Administrators and they are
> > > very
> > > > > often familiar only with IE, OE, Word/Excel and of course Solitare.
> > > So
> > > > > please don't tell me something like you don't need UTM, update and
> > > > > configure OS and watch what sites you are visting, and what you are
> > > > > running. I know that I keep uPnP off and configure router myself, I
> > > work
> > > > > as a limited user on Windows/Linux etc. etc. but not every home user
> > > is
> > > > > like me.
> > > >
> >
>
>
>
> --
> Posted via a free Usenet account from http://www.teranews.com

Re: What is UTM?

am 06.12.2006 17:28:54 von Bogwitch

Utter bollocks.

I would not buy anyting from you on the strength of that advice.

Bogwitch.
"Panda" wrote in message
news:1165406856.535569.310700@l12g2000cwl.googlegroups.com.. .
> Hello Bogwitch,
>
> All known and new viruses or worms signatures are stored in the
machine
> and will be pushed or updated from the Vendor service center.
>
> Yes, your protection software will be redundant! but please keep in
> mind you have to clean all LAN PCs and Servers before deploying any
UTM
> solution.
>
> Some UTM boxes do provide protection to suspicious or UNKNOWN
threats.
>
> Hope this answers all you questions!
>
> good luck!
>
> Naim
> www.networkingland.com
>
>
>
>
> Bogwitch wrote:
> > Hi Naim, or Panda,
> >
> > So, is the UTM device signature based, or address based?
> >
> > If it blocks ALL malware, does that make my Anti-virus/
anti-spyware/
> > anti-adware software redundant? My company would want to make a cost
saving,
> > you see.
> >
> > Again, can you tell me if there is any protection afforded by the
UTM box to
> > UNKNOWN malware?
> >
> > Thanks,
> >
> > Bogwitch.
> >
> > PS, with the marketing stats, etc. included in your post, it is
starting to
> > sound a lot like spam.
> >
> > "Panda" wrote in message
> > news:1165315620.614412.111890@80g2000cwy.googlegroups.com...
> > > Hi Bogwitch,
> > >
> > > UTM appliance is not a static device like Routers or Wireless
Access
> > > Points.
> > > You have to register your machine to the Vendor support center and
it
> > > can be programed
> > > ( every day or even every hour) to upload the latest protection
> > > software including new threats prevention from that center.
> > >
> > > www.networkingland.com/utm_technology.htm
> > >
> > > Most UTM appliances come with FREE trail service, but later on you
have
> > > to buy the service from your Vendor to have an active and living
> > > machine.
> > >
> > > Yes, it can protect hundreds or even thousands of PC and servers
in
> > > your LAN from Viruses, Spayware, Adware, bad contets, hacking and
> > > Intrusion ..... in one BoX!
> > >
> > > FORTINET - USA is leading this UTM market with over 180,000 units
> > > shipped since 2002 while keeping their in-house service support.
> > >
> > >
> > > Hope this answers raised questions!
> > >
> > >
> > > Naim
> > > www.networkingland.com
> > >
> > >
> > >
> > >
> > >
> > >
> > >
> > > Bogwitch wrote:
> > > > Hi Naim, or Panda,
> > > >
> > > > Your response raises a few more questions, and failed to answer
the
> > > > majority of questions posed by @lf.
> > > >
> > > > My questions, from your response are:
> > > >
> > > > How does it 'prevent' all known Internet threats from reaching
and
> > > > harming my computers? Exactly what threats does it block? ALL of
them?
> > > > That's a bold claim...
> > > >
> > > > How does it cope with unknown threats?
> > > >
> > > > How does it keep up-to-date? There are new threats arising
daily.
> > > >
> > > > It sounds as though the UTM device is acting just like my
router
> > > > firewall, which was provided free by my ISP. Is there much of a
> > > > difference? Why would I buy the UTM device?
> > > >
> > > > I look forward to your answer,
> > > >
> > > > Bogwitch
> > > >
> > > > "Panda" wrote in message
> > > > news:1165242166.272277.232300@j72g2000cwa.googlegroups.com.. .
> > > > > Hi,
> > > > >
> > > > > UTM is not a removal or fixing tool! it's an appliance with
one side
> > > > > hooked to the Internet and the other side to you LAN where it
will
> > > > > prevent all known Internet threats from reaching and harming
your
> > > > > computers.
> > > > >
> > > > > Internet ------------- UTM appliance --------- LAN (PCs and
Servers).
> > > > >
> > > > > No need for any software piece or agent to be installed in
each PC or
> > > > > server in you Local Area Network (LAN).
> > > > >
> > > > > You can still get personel software copies of UTM from Vendors
like
> > > > > FORTINET under the name Forti Client I guess.
> > > > >
> > > > > As for removing sticky programs from your computer, you can
still try
> > > > > this FREE Stratup tool: www.mlin.net it's very simple and
powerfull.
> > > > >
> > > > >
> > > > > Naim
> > > > > www.networkingland.com
> > > > >
> > > > >
> > > > >
> > > > > @lf wrote:
> > > > > > Panda wrote:
> > > > > > > What is UTM?
> > > > > >
> > > > > > I'm home user with a limited knowladge and I'm not very
familiar
> > > > with
> > > > > > UTM. Recently I tried to "fix" several zombies. The thing
they had
> > > > was
> > > > > > using uPnP to forward port and reconfigure router firewall,
Rootkit
> > > > and
> > > > > > process infection was succesfull in beating software
firewalls, AV,
> > > > > > anti-spam softvare and rootkit revealers. Pracitcally
nothing was
> > > > > > preventing zombie to operate. User was become aware that
something
> > > > is
> > > > > > wrong after his/her ISP has locked his/her account becouse
of
> > > > sending spam.
> > > > > >
> > > > > > Now, I'm interested is UTM has uPnP or similar interface for
> > > > > > auto-configuration (unexperienced users). Could "the thing"
> > > > reconfigure
> > > > > > it in a same way as it reconfigured uPnP capable NAT router
with
> > > > > > built-in firewall? For example by turning off it's features
or
> > > > configure
> > > > > > it in a way that malicius traffic is allowed without
warnning (for
> > > > > > example by adding exceptions to UTM box by uPnP)?
> > > > > >
> > > > > > Enyone has experience in working with UTM? If it cannot be
> > > > reconfigured
> > > > > > by uPnP or similar with "the thing" in a way that zombie
start to
> > > > > > operate without warnning, this might be interesting security
> > > > solution
> > > > > > that actually does some work. Well, zombie machine still
have to be
> > > > > > flatten and rebuilt but no damage to other internet users is
done
> > > > > > (zombie is unoperational -> no spam -> no rootkit/virus
> > > > dispatching).
> > > > > >
> > > > > > Note that unexperienced users work as Administrators and
they are
> > > > very
> > > > > > often familiar only with IE, OE, Word/Excel and of course
Solitare.
> > > > So
> > > > > > please don't tell me something like you don't need UTM,
update and
> > > > > > configure OS and watch what sites you are visting, and what
you are
> > > > > > running. I know that I keep uPnP off and configure router
myself, I
> > > > work
> > > > > > as a limited user on Windows/Linux etc. etc. but not every
home user
> > > > is
> > > > > > like me.
> > > > >
> > >
> >
> >
> >
> > --
> > Posted via a free Usenet account from http://www.teranews.com
>

Re: What is UTM?

am 07.12.2006 12:53:57 von panda

Thank you for the " Utter bollocks"!!!!

I am not selling any thing here but I am tying to help to spead this
kind of knowledge.

regards,

Naim (Panda)


On Dec 6, 6:28 pm, "Bogwitch" wrote:
> Utter bollocks.
>
> I would not buy anyting from you on the strength of that advice.
>
> Bogwitch."Panda" wrote in messagenews:1165406856.535569.310700@l12g2000cwl.googlegroup s.com...
>
>
>
> > Hello Bogwitch,
>
> > All known and new viruses or worms signatures are stored in the
> machine
> > and will be pushed or updated from the Vendor service center.
>
> > Yes, your protection software will be redundant! but please keep in
> > mind you have to clean all LAN PCs and Servers before deploying any
> UTM
> > solution.
>
> > Some UTM boxes do provide protection to suspicious or UNKNOWN
> threats.
>
> > Hope this answers all you questions!
>
> > good luck!
>
> > Naim
> >www.networkingland.com
>
> > Bogwitch wrote:
> > > Hi Naim, or Panda,
>
> > > So, is the UTM device signature based, or address based?
>
> > > If it blocks ALL malware, does that make my Anti-virus/
> anti-spyware/
> > > anti-adware software redundant? My company would want to make a cost
> saving,
> > > you see.
>
> > > Again, can you tell me if there is any protection afforded by the
> UTM box to
> > > UNKNOWN malware?
>
> > > Thanks,
>
> > > Bogwitch.
>
> > > PS, with the marketing stats, etc. included in your post, it is
> starting to
> > > sound a lot like spam.
>
> > > "Panda" wrote in message
> > >news:1165315620.614412.111890@80g2000cwy.googlegroups.com.. .
> > > > Hi Bogwitch,
>
> > > > UTM appliance is not a static device like Routers or Wireless
> Access
> > > > Points.
> > > > You have to register your machine to the Vendor support center and
> it
> > > > can be programed
> > > > ( every day or even every hour) to upload the latest protection
> > > > software including new threats prevention from that center.
>
> > > >www.networkingland.com/utm_technology.htm
>
> > > > Most UTM appliances come with FREE trail service, but later on you
> have
> > > > to buy the service from your Vendor to have an active and living
> > > > machine.
>
> > > > Yes, it can protect hundreds or even thousands of PC and servers
> in
> > > > your LAN from Viruses, Spayware, Adware, bad contets, hacking and
> > > > Intrusion ..... in one BoX!
>
> > > > FORTINET - USA is leading this UTM market with over 180,000 units
> > > > shipped since 2002 while keeping their in-house service support.
>
> > > > Hope this answers raised questions!
>
> > > > Naim
> > > >www.networkingland.com
>
> > > > Bogwitch wrote:
> > > > > Hi Naim, or Panda,
>
> > > > > Your response raises a few more questions, and failed to answer
> the
> > > > > majority of questions posed by @lf.
>
> > > > > My questions, from your response are:
>
> > > > > How does it 'prevent' all known Internet threats from reaching
> and
> > > > > harming my computers? Exactly what threats does it block? ALL of
> them?
> > > > > That's a bold claim...
>
> > > > > How does it cope with unknown threats?
>
> > > > > How does it keep up-to-date? There are new threats arising
> daily.
>
> > > > > It sounds as though the UTM device is acting just like my
> router
> > > > > firewall, which was provided free by my ISP. Is there much of a
> > > > > difference? Why would I buy the UTM device?
>
> > > > > I look forward to your answer,
>
> > > > > Bogwitch
>
> > > > > "Panda" wrote in message
> > > > >news:1165242166.272277.232300@j72g2000cwa.googlegroups.com. ..
> > > > > > Hi,
>
> > > > > > UTM is not a removal or fixing tool! it's an appliance with
> one side
> > > > > > hooked to the Internet and the other side to you LAN where it
> will
> > > > > > prevent all known Internet threats from reaching and harming
> your
> > > > > > computers.
>
> > > > > > Internet ------------- UTM appliance --------- LAN (PCs and
> Servers).
>
> > > > > > No need for any software piece or agent to be installed in
> each PC or
> > > > > > server in you Local Area Network (LAN).
>
> > > > > > You can still get personel software copies of UTM from Vendors
> like
> > > > > > FORTINET under the name Forti Client I guess.
>
> > > > > > As for removing sticky programs from your computer, you can
> still try
> > > > > > this FREE Stratup tool:www.mlin.netit's very simple and
> powerfull.
>
> > > > > > Naim
> > > > > >www.networkingland.com
>
> > > > > > @lf wrote:
> > > > > > > Panda wrote:
> > > > > > > > What is UTM?
>
> > > > > > > I'm home user with a limited knowladge and I'm not very
> familiar
> > > > > with
> > > > > > > UTM. Recently I tried to "fix" several zombies. The thing
> they had
> > > > > was
> > > > > > > using uPnP to forward port and reconfigure router firewall,
> Rootkit
> > > > > and
> > > > > > > process infection was succesfull in beating software
> firewalls, AV,
> > > > > > > anti-spam softvare and rootkit revealers. Pracitcally
> nothing was
> > > > > > > preventing zombie to operate. User was become aware that
> something
> > > > > is
> > > > > > > wrong after his/her ISP has locked his/her account becouse
> of
> > > > > sending spam.
>
> > > > > > > Now, I'm interested is UTM has uPnP or similar interface for
> > > > > > > auto-configuration (unexperienced users). Could "the thing"
> > > > > reconfigure
> > > > > > > it in a same way as it reconfigured uPnP capable NAT router
> with
> > > > > > > built-in firewall? For example by turning off it's features
> or
> > > > > configure
> > > > > > > it in a way that malicius traffic is allowed without
> warnning (for
> > > > > > > example by adding exceptions to UTM box by uPnP)?
>
> > > > > > > Enyone has experience in working with UTM? If it cannot be
> > > > > reconfigured
> > > > > > > by uPnP or similar with "the thing" in a way that zombie
> start to
> > > > > > > operate without warnning, this might be interesting security
> > > > > solution
> > > > > > > that actually does some work. Well, zombie machine still
> have to be
> > > > > > > flatten and rebuilt but no damage to other internet users is
> done
> > > > > > > (zombie is unoperational -> no spam -> no rootkit/virus
> > > > > dispatching).
>
> > > > > > > Note that unexperienced users work as Administrators and
> they are
> > > > > very
> > > > > > > often familiar only with IE, OE, Word/Excel and of course
> Solitare.
> > > > > So
> > > > > > > please don't tell me something like you don't need UTM,
> update and
> > > > > > > configure OS and watch what sites you are visting, and what
> you are
> > > > > > > running. I know that I keep uPnP off and configure router
> myself, I
> > > > > work
> > > > > > > as a limited user on Windows/Linux etc. etc. but not every
> home user
> > > > > is
> > > > > > > like me.
>
> > > --
> > > Posted via a free Usenet account fromhttp://www.teranews.com- Hide quoted text -- Show quoted text -

Re: What is UTM?

am 07.12.2006 13:11:34 von Bogwitch

Naim,

With the knowledge you are spreading, you will not be helping anyone.

There is NO WAY a UTM device would remove the requirement for AV software or
any anti-malware software.

Bogwitch.

"Panda" wrote in message
news:1165492437.186843.72820@n67g2000cwd.googlegroups.com...
> Thank you for the " Utter bollocks"!!!!
>
> I am not selling any thing here but I am tying to help to spead this
> kind of knowledge.
>
> regards,
>
> Naim (Panda)
>
>
> On Dec 6, 6:28 pm, "Bogwitch" wrote:
> > Utter bollocks.
> >
> > I would not buy anyting from you on the strength of that advice.
> >
> > Bogwitch."Panda" wrote in
messagenews:1165406856.535569.310700@l12g2000cwl.googlegroup s.com...
> >
> >
> >
> > > Hello Bogwitch,
> >
> > > All known and new viruses or worms signatures are stored in the
> > machine
> > > and will be pushed or updated from the Vendor service center.
> >
> > > Yes, your protection software will be redundant! but please keep in
> > > mind you have to clean all LAN PCs and Servers before deploying any
> > UTM
> > > solution.
> >
> > > Some UTM boxes do provide protection to suspicious or UNKNOWN
> > threats.
> >
> > > Hope this answers all you questions!
> >
> > > good luck!
> >
> > > Naim
> > >www.networkingland.com
> >
> > > Bogwitch wrote:
> > > > Hi Naim, or Panda,
> >
> > > > So, is the UTM device signature based, or address based?
> >
> > > > If it blocks ALL malware, does that make my Anti-virus/
> > anti-spyware/
> > > > anti-adware software redundant? My company would want to make a cost
> > saving,
> > > > you see.
> >
> > > > Again, can you tell me if there is any protection afforded by the
> > UTM box to
> > > > UNKNOWN malware?
> >
> > > > Thanks,
> >
> > > > Bogwitch.
> >
> > > > PS, with the marketing stats, etc. included in your post, it is
> > starting to
> > > > sound a lot like spam.
> >
> > > > "Panda" wrote in message
> > > >news:1165315620.614412.111890@80g2000cwy.googlegroups.com.. .
> > > > > Hi Bogwitch,
> >
> > > > > UTM appliance is not a static device like Routers or Wireless
> > Access
> > > > > Points.
> > > > > You have to register your machine to the Vendor support center and
> > it
> > > > > can be programed
> > > > > ( every day or even every hour) to upload the latest protection
> > > > > software including new threats prevention from that center.
> >
> > > > >www.networkingland.com/utm_technology.htm
> >
> > > > > Most UTM appliances come with FREE trail service, but later on you
> > have
> > > > > to buy the service from your Vendor to have an active and living
> > > > > machine.
> >
> > > > > Yes, it can protect hundreds or even thousands of PC and servers
> > in
> > > > > your LAN from Viruses, Spayware, Adware, bad contets, hacking and
> > > > > Intrusion ..... in one BoX!
> >
> > > > > FORTINET - USA is leading this UTM market with over 180,000 units
> > > > > shipped since 2002 while keeping their in-house service support.
> >
> > > > > Hope this answers raised questions!
> >
> > > > > Naim
> > > > >www.networkingland.com
> >
> > > > > Bogwitch wrote:
> > > > > > Hi Naim, or Panda,
> >
> > > > > > Your response raises a few more questions, and failed to answer
> > the
> > > > > > majority of questions posed by @lf.
> >
> > > > > > My questions, from your response are:
> >
> > > > > > How does it 'prevent' all known Internet threats from reaching
> > and
> > > > > > harming my computers? Exactly what threats does it block? ALL of
> > them?
> > > > > > That's a bold claim...
> >
> > > > > > How does it cope with unknown threats?
> >
> > > > > > How does it keep up-to-date? There are new threats arising
> > daily.
> >
> > > > > > It sounds as though the UTM device is acting just like my
> > router
> > > > > > firewall, which was provided free by my ISP. Is there much of a
> > > > > > difference? Why would I buy the UTM device?
> >
> > > > > > I look forward to your answer,
> >
> > > > > > Bogwitch
> >
> > > > > > "Panda" wrote in message
> > > > > >news:1165242166.272277.232300@j72g2000cwa.googlegroups.com. ..
> > > > > > > Hi,
> >
> > > > > > > UTM is not a removal or fixing tool! it's an appliance with
> > one side
> > > > > > > hooked to the Internet and the other side to you LAN where it
> > will
> > > > > > > prevent all known Internet threats from reaching and harming
> > your
> > > > > > > computers.
> >
> > > > > > > Internet ------------- UTM appliance --------- LAN (PCs and
> > Servers).
> >
> > > > > > > No need for any software piece or agent to be installed in
> > each PC or
> > > > > > > server in you Local Area Network (LAN).
> >
> > > > > > > You can still get personel software copies of UTM from Vendors
> > like
> > > > > > > FORTINET under the name Forti Client I guess.
> >
> > > > > > > As for removing sticky programs from your computer, you can
> > still try
> > > > > > > this FREE Stratup tool:www.mlin.netit's very simple and
> > powerfull.
> >
> > > > > > > Naim
> > > > > > >www.networkingland.com
> >
> > > > > > > @lf wrote:
> > > > > > > > Panda wrote:
> > > > > > > > > What is UTM?
> >
> > > > > > > > I'm home user with a limited knowladge and I'm not very
> > familiar
> > > > > > with
> > > > > > > > UTM. Recently I tried to "fix" several zombies. The thing
> > they had
> > > > > > was
> > > > > > > > using uPnP to forward port and reconfigure router firewall,
> > Rootkit
> > > > > > and
> > > > > > > > process infection was succesfull in beating software
> > firewalls, AV,
> > > > > > > > anti-spam softvare and rootkit revealers. Pracitcally
> > nothing was
> > > > > > > > preventing zombie to operate. User was become aware that
> > something
> > > > > > is
> > > > > > > > wrong after his/her ISP has locked his/her account becouse
> > of
> > > > > > sending spam.
> >
> > > > > > > > Now, I'm interested is UTM has uPnP or similar interface for
> > > > > > > > auto-configuration (unexperienced users). Could "the thing"
> > > > > > reconfigure
> > > > > > > > it in a same way as it reconfigured uPnP capable NAT router
> > with
> > > > > > > > built-in firewall? For example by turning off it's features
> > or
> > > > > > configure
> > > > > > > > it in a way that malicius traffic is allowed without
> > warnning (for
> > > > > > > > example by adding exceptions to UTM box by uPnP)?
> >
> > > > > > > > Enyone has experience in working with UTM? If it cannot be
> > > > > > reconfigured
> > > > > > > > by uPnP or similar with "the thing" in a way that zombie
> > start to
> > > > > > > > operate without warnning, this might be interesting security
> > > > > > solution
> > > > > > > > that actually does some work. Well, zombie machine still
> > have to be
> > > > > > > > flatten and rebuilt but no damage to other internet users is
> > done
> > > > > > > > (zombie is unoperational -> no spam -> no rootkit/virus
> > > > > > dispatching).
> >
> > > > > > > > Note that unexperienced users work as Administrators and
> > they are
> > > > > > very
> > > > > > > > often familiar only with IE, OE, Word/Excel and of course
> > Solitare.
> > > > > > So
> > > > > > > > please don't tell me something like you don't need UTM,
> > update and
> > > > > > > > configure OS and watch what sites you are visting, and what
> > you are
> > > > > > > > running. I know that I keep uPnP off and configure router
> > myself, I
> > > > > > work
> > > > > > > > as a limited user on Windows/Linux etc. etc. but not every
> > home user
> > > > > > is
> > > > > > > > like me.
> >
> > > > --
> > > > Posted via a free Usenet account fromhttp://www.teranews.com- Hide
quoted text -- Show quoted text -
>



--
Posted via a free Usenet account from http://www.teranews.com