Features of having a UTM in place:
Router – This device can be configured for use at the edge of your network and act as the main router for your internet connection
Anti-Malware – Software on the UTM can detect malware and remove it before it can get onto your systems
Sandboxing – Inbuilt software tests packets of data before they are released onto your network. These packets are tested for issues, the software will detect the issues by activating the packets in a secure environment and then analyse the results
Encrypted VPN – Allows the setup of encrypted VPN using IPSEC, IKEv2 and L2TP.
Firewall – Can configure firewall rules to allow and block traffic as needed.