Decrease font size
Increase font size
Topic Title: Security for Business Networks
Topic Summary: Security for a business’s computing resources and networks is similarly important
Created On: 29 July 2013 04:28 AM
Status: Read Only
Linear : Threading : Single : Branch
Search Topic Search Topic
Topic Tools Topic Tools
View similar topics View similar topics
View topic in raw text format. Print this topic.
 29 July 2013 04:28 AM
User is offline View Users Profile Print this message


Posts: 4
Joined: 25 July 2013

About security for business Networks, this article mentions to combine multiple security products into a single platform. Is this widely used nowadays in companes?

Link Removed

"UTM brings together previously disparate security platforms and technologies. A typical UTM solution will have a broad base of functionality including firewall, Virtual Private Network (VPN), network-based anti-virus and anti-spam intrusion prevention, content filtering, user authentication and even load balancing. UTM must now protect against a wide variety of threats from both external and internal sources. While not necessarily complicit in any attack, employees (and their computers/laptops) are being targeted as "softer" entry points into a network. Internal user control and identity-based policies are now increasingly important so as to limit who can do what..."

Does this mean that employee's every action are limited and controlled? Any real example?

See Also:

FuseTalk Standard Edition v3.2 - © 1999-2016 FuseTalk Inc. All rights reserved.