F5 GLOSSARY

Unified Threat Management (UTM)

What is UTM (Unified Threat Management)?

UTM (Unified Threat Management) is a method for comprehensively protecting computer systems (internal networks) from security threats such as viruses and external attacks. In Japanese, it is referred to as "統合脅威管理" (Integrated Threat Management).

Security features are provided by various devices and software, including firewalls, VPN routers/software, antivirus software, IDS (Intrusion Detection System), IPS (Intrusion Prevention System), content filtering, and anti-spam measures, each targeting different threats, layers, and defensive methods. Managing all of these tools individually places a significant burden on system administrators. Complex management increases the likelihood of security gaps. To address this, UTM integrates multiple security features into a single solution. By placing UTM as a gateway between the internal and external networks, organizations can centralize their security threat management, reduce administrative burdens, and enhance overall security.

F5’s BIG-IP platform offers a wide range of network security features, including firewalls, Web Application Firewalls (WAF), and access control. F5 also actively collaborates with partners to enable UTM by integrating with third-party products.