Screencast: How to configure a UTM device

In this exclusive screencast, expert David Strom demonstrates the configuration options available in SonicWall's unified threat management product.

In this step-by-step, automated demo, network security expert David Strom demonstrates the configuration options available in SonicWall's unified threat management product.


View in full-screen mode (opens new window).

@36742 About the author:
David Strom is one of the leading experts on network and Internet technologies and has written extensively on the topic for nearly 20 years. He has held several editorial management positions for both print and online properties, most recently as Editor-in-Chief for Tom's Hardware. In 1990, Strom created Network Computing magazine and was the first Editor-in-Chief establishing the magazine's networked laboratories. He is the author of two books: Internet Messaging (Prentice Hall 1998) which he co-authored with Marshall T. Rose and Home Networking Survival Guide (McGrawHill/Osbourne; 2001). Strom is a frequent speaker, panel moderator and instructor and has appeared on Fox TV News Network, NPR's Science Friday radio program, ABC TV's World News Tonight and CBS-TV's Up to the Minute.

Learn more about unified threat management

Read more on IT risk management