10 Reasons to Consolidate Threat Management White Paper

0 Views
Published
For many years, the security systems in most business networks consisted of:
■ a firewall at the network’s point of connection to the Internet
■ anti-virus software, and maybe local firewalls, on work stations

However, in recent times, as the range of attacks has broadened and more points of vulnerability have been identified, the collection
of security devices and software commonly used in networks has grown.
It is now not unusual to find a network that contains all of the following security measures:
■ a firewall
■ web-traffic filtering software
■ email filtering software
■ an intrusion detection device or software
■ Data-Leakage Prevention systems
■ Distributed Denial of Service (DDoS) prevention systems
■ one or more pieces of application-specific security software or proxies
■ an SSL gateway
■ VPN routers
■ anti-virus software

All of these items do a certain job very well, and each makes a significant contribution to the security of the network. However, there are significant downsides to a network security system consisting of multiple independent pieces.

This white paper considers these downsides, and then looks at an alternative solution for network security that avoids these problems.
Category
Allied Telesis
Tags
White Paper, Allied Telesis, Network Management
Be the first to comment