Tech moves fast! Stay ahead of the curve with Techopedia!
Join nearly 200,000 subscribers who receive actionable tech insights from Techopedia.
Integrated threat management (ITM) is a security approach that consolidates different security components into a single platform or application for an enterprise IT architecture. ITM evolved as a response to increasingly complex and frequent malicious attacks by hackers and others intent on damaging systems.
ITM is also known as threat management, unified threat management (UTM), universal threat management (UTM) and security threat management (STM).
As the name implies, ITM represents a unified solution that runs between a corporate/other network and public access channel. An effective ITM solution incorporates firewalls, virtual private networks (VPN), antivirus capabilities and other security measures to protect a network at various levels.
ITM solutions address different types of attacks, such as malware and spam. Developers consider the broad range of attacks that result in system damage - from crashing systems to damaging or stealing data. An effective ITM tool addresses the most common system threats in a production environment.
Most ITM approaches pay special attention to blended threats, where attacks occur at multiple levels. Those charged with protecting systems must be continuously aware of potential attack points, like gateway levels or user endpoints.