

The authors examine Cyberoam UTM product which is among the most widely trusted tools in the information security arsenal. This paper discusses the issues and challenges of cyber network management using Unified threat management (UTM) systems.

However, the process of evaluating UTM options is not simple.

The concept of unified threat management (UTM) is very appealing with multiple critical security technologies, integrated on a single platform, provided by a single vendor. A need to check and track the activity of cyber terrors and attackers through threat management is therefore required. Online attacks continue to grow in their complexity and they impact different industries in different ways.
