Overview, Introduction to h3c seccenter utm manager, What h3c seccenter utm manager can do – H3C Technologies H3C SecCenter UTM Manager User Manual

Page 9

Advertising
background image

1

Overview

Introduction to H3C SecCenter UTM Manager

H3C SecCenter Unified Threat Management (UTM) Manager is a powerful system for comprehensive

analysis and centralized management of UTM devices. It is an important component of the H3C Security

Management Center (SecCenter).
The UTM Manager allows you to manage and control all UTM devices in your network. It features great
scalability, visual realtime event monitoring, comprehensive security event analysis such as attack, virus,

worm, and DDoS event analysis, and rich reports, enabling you to learn the network security status at any

time. Together with UTM devices, the UTM Manager provides you with visual, all-around, powerful

network security protection.
Meanwhile, the UTM Manager supports control and auditing based on Layer 7 applications. It provides

traffic analysis and management based on service, user, and IP group, enables peer to peer (P2P)
service monitoring and management, and allows for user behavior auditing and service control policies,

satisfying the requirements of service providers for granular data support and traffic/service control, and

virtually implementing visual control and management of network applications.

What H3C SecCenter UTM Manager can do

As a powerful, efficient UTM device management system, the UTM Manager allows for centralized

management of UTM devices, unified traffic and service monitoring, centralized collection and analysis
of security events, exact analysis of network traffic, and rich network resource usage reports. From the

all-around reports, you can learn the history security status as well as the security trends of the network

easily.
The UTM Manager presents the following key features:

Exact application traffic analysis, allowing you to know the network resources usage thoroughly.

Realtime traffic abnormality and service abnormality detection, helping you prevent overuse of
bandwidth.

All-around attack/virus event monitoring, helping you discover security problems in time.

Automatic, periodic report exporting, releasing you from manual export of reports.

Visual realtime monitoring, helping you detect network attacks in time.

Perfect comprehensive analysis and rich statistics reports, reducing your analysis time.

Fine log and behavior auditing, allowing you to track events easily.

Centralized upgrade of signature files, ensuring identification of new attack behaviors.

Friendly and easy-to-use interface, allowing easy deployment.

Advertising