Screencast: How to configure a UTM device
In this exclusive screencast, expert David Strom demonstrates the configuration options available in SonicWall's unified threat management product.
@36742 About the author:
David Strom is one of the leading experts on network and Internet technologies and has written extensively on the topic for nearly 20 years. He has held several editorial management positions for both print and online properties, most recently as Editor-in-Chief for Tom's Hardware. In 1990, Strom created Network Computing magazine and was the first Editor-in-Chief establishing the magazine's networked laboratories. He is the author of two books: Internet Messaging (Prentice Hall 1998) which he co-authored with Marshall T. Rose and Home Networking Survival Guide (McGrawHill/Osbourne; 2001). Strom is a frequent speaker, panel moderator and instructor and has appeared on Fox TV News Network, NPR's Science Friday radio program, ABC TV's World News Tonight and CBS-TV's Up to the Minute.
Learn more about unified threat management
- Intrusion Defense School: Unified threat management
In this lesson, learn about the basics of unified threat management as it pertains to intrusion defense. Featuring Joel Snyder.
- Visit our unified threat management resource center.
- Check out Information Security magazine's Unified threat management guide for managers.