| With development of the application of network into practice, we should take all kinds of the problems of securities into consideration in order to guarantee the programs well done. For example:Equipment Fault; Hackers Attack; Information Security; Virus Dissemination etc.However, all kinds of products of security and technology can only solve a part of problems. Meanwhile, the disadvantages of them are short of capacity of collaborative scheduling and unified management with each other. The situation is not only making the network management take on heavy burden, but also increases the safeguard expenses. So we will develop a kind of technology named:Unify Security Management (USM), which is all around and comprehensive. Then centralized monitoring on security resources, unify program disposition and security equipment interact with each other at the same interface is on the basis of it. Security resources include:Firewall; VPN; USM; Vulnerability Scanning; Anti-virus; Authentication; Security Audit, etc. This paper researches and analyzes the USM technology, and knows about the situation and tendency of it in home and abroad.In the process of development and use of USM, we are in need of methods to evaluate the products of USM at different stages so that we are able to grasp the details of USM clearly and thoroughly. It provides a meaningful instruction for our development and use. The paper introduces various evaluation methods in home and abroad, and sets a concrete index, and then builds evaluation environment, and implements the process. Finally, evaluating the certain index, we get a result and have a conclusion. |