Product Group Tests
Multi-function appliances (2006)August 08, 2006
We rate InstaGate PRO as our Best Buy for its extreme flexibility, feature-rich environment and reasonable cost of ownership, while the Proventia Network MFS Appliance is the first of our Recommended products. Like others of Proventia’s product range, it is well thought-out, versatile, well-documented and priced in the middle of the UTM pack. The NetPilot appliance wins our other Recommended award for its value in small or widely distributed branch -office environments.
Who benefits from multi-function IT security appliances? Is an all-in-one box better than specialised devices? Peter Stephenson looks at the pros and cons when it comes to different business needs
This month, we looked at ten multi-function security appliances. These appliances are all over the map in terms of their functionality. Because we have discussed the individual functions of many of these appliances elsewhere, for this group test we concentrated upon how well integrated these functions were and how the appliance as a unit presented its information.
During the tests, some important questions came to mind that must be answered before implementation. First, who benefits from these products? Would they better suit small businesses, or large, dispersed organisations? Also, how critical is the appliance as a single point of failure in the overall architectures of the network? This affects both network and security architecture. Finally, how do these appliances impact a corporate defence-in-depth strategy?
These are three crucial questions for any security tool, but even more so if they are multi-functional.
Another issue is how these devices stack up against universal threat management (UTM). Here's another example of how marketing has added confusion rather than clarity. What is the difference between a multi-function appliance and UTM? Defta Partners (www.deftapartners.com/newsarchive2.htm) quotes IDC: "UTM products unify and integrate multiple security features onto a single hardware platform. Qualification for inclusion within this category requires network firewall capabilities, network intrusion detection and prevention (IDP), and gateway anti-virus (AV) functionality."
Of the ten boxes reviewed, seven met those criteria, but it would be hard to argue that not all ten were multi-function devices. So our definition of multi-function is, in most cases, a superset of the IDC definition of a UTM. You get the point, I'm sure. Defining what you need to buy depends more on your requirements than on convenient marketing labels.
So what are the pros and cons of multi-function appliances? There is no doubt that, at some level, they are a single point of failure. The more functions they offer, the more risky that becomes. But depending upon the situation, a single point of failure might be manageable with a hot standby.
More important, however, is the appliance's impact upon defence in depth. While they offer a lot of convenience and even an economic benefit, there is no doubt that some depth is sacrificed. Compromising the appliance may compromise the entire network if it is the only point of connection between the untrusted and the trusted environments.
Appliances that are used as "omni-purpose", such as firewalls, VPNs, anti-virus, anti-spam, web filters, anti-spyware and IDS/IPS, can be complicated to configure and manage. Small configuration errors can have big consequences, so we put a lot of emphasis on ease of use in our testing.
Generally, we found that there is an inverse relationship between the size of an organisation and the number of features in an appropriate multi-function appliance. The smaller the organisation, the bigger a role cost plays. A multi-function appliance can offer a lot of protection for a relatively low price. The downsides are the single point of failure, impact on defence in depth and need for solid training of all support personnel. For these organisations, full-featured appliances may make sense, but have a cost attached.
For large organisations with big throughput requirements it makes more sense to use specialised devices. Splitting malware defence, VPN/firewall, and IDS/IPS might offer a better response to the defence-in-depth problem. These products are available as well as the fully-featured ones. Also, more fully-featured versions might be appropriate for outlying offices.
The bottom line is that these appliances do not, regardless of initial appearances, represent a panacea. They need to be architected into the security and network infrastructures, just as with any other security device.
Because most of these devices have been reviewed for their individual modules, we opted to evaluate them based on how their features hold together. We were looking for ease of use over the span of all capabilities, reporting, ease of implementation and management and overall performance. These tests were more functional than usual and we took the viewpoint of the implementer and/or administrator.
Our conclusions are that these products are all over the place in usefulness and desirability. This really is a case of "buyer beware". However, we had some clear winners, and we believe that the use of multi-function appliances can be appropriate, with some good products available to satisfy varying needs. And that's a good thing, because these puppies are here to stay.
All products in this group test
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Interim CISO (Chief Information Security Officer) - Cyber Security Director
CYBER EXECS - London (Central), London (Greater)
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry