SecPoint Unveils UTM Firewall With Vulnerability Assessment And Scanning

SecPoint Unveils UTM Firewall With Vulnerability Assessment And Scanning

FP Archives February 3, 2017, 00:09:30 IST

This intrinsic two-way feature is available to both versions of the SecPoint Protector.

Advertisement
SecPoint Unveils UTM Firewall With Vulnerability Assessment And Scanning

The hardware-based and software-based security SecPoint released what could be the world’s first Unified Threat Management (UTM) firewall appliance that features vulnerability scanning and assessment as part of its features in a simultaneous manner.

One could truly manage threats in a unified manner by conducting vulnerability assessment before undergoing a vulnerability scan in only one device. This is an important development because doing a vulnerability assessment prior to scanning serves as the scan’s guide towards a more thorough and meticulous scan and penetration test at the same time. This intrinsic two-way feature is available to both versions of the SecPoint Protector, which is the regular “parent” and includes all the same attributes such as firewall, intrusion detection, and prevention of threats. A UTM couldn’t truly be considered a UTM unless it incorporates absolutely everything in its quest to manage threats.

Advertisement

It makes sense that the firewall and threat manager acquires further detection advancements that truly gives systems a thorough sweeping of sorts on top of all the Content Filter, Anti-Phishing, Antivirus, Anti-Spam, Web Filtering, and Application Control that both versions of the Protector currently offer. Although one might believe that a vulnerability scan is enough to handle all cases of code flaw problems, having an assessment before the scan is actually akin to mapping out a proper route prior to traveling. It cuts down on significantly on wasted scanning time because the assessment portion of the examination has already provided a “route” of sorts for the scan to travel, like an already treaded path in a vast labyrinth of sorts.

The bottom line here is that UTM entails absolute protection in all fronts, and the Protector from SecPoint upholds this concept with the incorporation of two distinct attributes into one hardware device for the first time since the conceptualisation of UTM. The Protector already handles content management on the administrator level, so it makes sense that Vulnerability Assessment and Vulnerability Scanning be added to the UTM Firewall and Threat Manager as a means to make absolutely sure that the content being managed and filtered is also free of crippling, exploitable bugs and code flaws.

Advertisement
Written by FP Archives

see more

Latest News

Find us on YouTube

Subscribe

Top Shows

Vantage First Sports Fast and Factual Between The Lines