<s>
A	O
security	B-Application
appliance	I-Application
is	O
any	O
form	O
of	O
server	B-Architecture
appliance	I-Architecture
that	O
is	O
designed	O
to	O
protect	O
computer	B-Architecture
networks	I-Architecture
from	O
unwanted	O
traffic	O
.	O
</s>
<s>
Examples	O
of	O
such	O
devices	O
are	O
firewalls	B-Application
,	O
anti	B-Application
virus	I-Application
scanning	O
devices	O
,	O
and	O
content	B-Protocol
filtering	I-Protocol
devices	O
.	O
</s>
<s>
Preventative	O
devices	O
scan	O
networks	O
and	O
identify	O
potential	O
security	O
problems	O
(	O
such	O
as	O
penetration	O
testing	O
and	O
vulnerability	B-General_Concept
assessment	I-General_Concept
appliances	O
)	O
.	O
</s>
<s>
Unified	O
Threat	O
Management	O
(	O
UTM	O
)	O
appliances	O
combine	O
features	O
together	O
into	O
one	O
system	O
,	O
such	O
as	O
some	O
firewalls	B-Application
,	O
content	B-Protocol
filtering	I-Protocol
,	O
web	B-Protocol
caching	I-Protocol
etc	O
.	O
</s>
