For many years, the security systems in most business networks consisted of:
■ a firewall at the network’s point of connection to the Internet
■ anti-virus software, and maybe local firewalls, on work stations
However, in recent times, as the range of attacks has broadened and more points of vulnerability have been identified, the collection
of security devices and software commonly used in networks has grown.
It is now not unusual to find a network that contains all of the following security measures:
■ a firewall
■ web-traffic filtering software
■ email filtering software
■ an intrusion detection device or software
■ Data-Leakage Prevention systems
■ Distributed Denial of Service (DDoS) prevention systems
■ one or more pieces of application-specific security software or proxies
■ an SSL gateway
■ VPN routers
■ anti-virus software
All of these items do a certain job very well, and each makes a significant contribution to the security of the network. However, there are significant downsides to a network security system consisting of multiple independent pieces.
This white paper considers these downsides, and then looks at an alternative solution for network security that avoids these problems.
■ a firewall at the network’s point of connection to the Internet
■ anti-virus software, and maybe local firewalls, on work stations
However, in recent times, as the range of attacks has broadened and more points of vulnerability have been identified, the collection
of security devices and software commonly used in networks has grown.
It is now not unusual to find a network that contains all of the following security measures:
■ a firewall
■ web-traffic filtering software
■ email filtering software
■ an intrusion detection device or software
■ Data-Leakage Prevention systems
■ Distributed Denial of Service (DDoS) prevention systems
■ one or more pieces of application-specific security software or proxies
■ an SSL gateway
■ VPN routers
■ anti-virus software
All of these items do a certain job very well, and each makes a significant contribution to the security of the network. However, there are significant downsides to a network security system consisting of multiple independent pieces.
This white paper considers these downsides, and then looks at an alternative solution for network security that avoids these problems.
- Category
- Allied Telesis
- Tags
- White Paper, Allied Telesis, Network Management
Be the first to comment