CIS 534 Week 6 Discussion 2
"Firewall Security Strategies" Please respond to the following:
- Examine and explain four security strategies used for firewalls. Explain the two that you would highly recommend being implemented. Provide a rationale for your response.
ANS:
"Firewall Security Strategies" Please respond to the following:
- Examine and explain four security strategies used for firewalls. Explain the two that you would highly recommend being implemented. Provide a rationale for your response.
Unified threat management (UTM) is the deployment of a firewall as an all-encompassing primary gateway security solution. The idea behind UTM is that you can use a single device to perform firewall filtering, IPS, antivirus scanning, anti-spam filtering, VPN endpoint hosting, content filtering, load balancing, detailed logging, and potentially other security services, performance enhancements, or extended capabilities. UTM has its advantages, mainly in the ability to deploy a single product and manage multiple security services from a single interface.
CIS 534 Week 6 Discussion 2
No comments:
Post a Comment
Note: only a member of this blog may post a comment.