IET
Decrease font size
Increase font size
Topic Title: Security for Business Networks
Topic Summary: Security for a business’s computing resources and networks is similarly important
Created On: 29 July 2013 04:28 AM
Status: Read Only
Linear : Threading : Single : Branch
Search Topic Search Topic
Topic Tools Topic Tools
View similar topics View similar topics
View topic in raw text format. Print this topic.
 29 July 2013 04:28 AM
User is offline View Users Profile Print this message



pennyh

Posts: 4
Joined: 25 July 2013

About security for business Networks, this article mentions to combine multiple security products into a single platform. Is this widely used nowadays in companes?

Look here!

"UTM brings together previously disparate security platforms and technologies. A typical UTM solution will have a broad base of functionality including firewall, Virtual Private Network (VPN), network-based anti-virus and anti-spam intrusion prevention, content filtering, user authentication and even load balancing. UTM must now protect against a wide variety of threats from both external and internal sources. While not necessarily complicit in any attack, employees (and their computers/laptops) are being targeted as "softer" entry points into a network. Internal user control and identity-based policies are now increasingly important so as to limit who can do what..."

Does this mean that employee's every action are limited and controlled? Any real example?
Statistics

See Also:



FuseTalk Standard Edition v3.2 - © 1999-2014 FuseTalk Inc. All rights reserved.