Tuesday, 20 October 2015

CIS 534 Week 6 Discussion 2

CIS 534 Week 6 Discussion 2

"Firewall Security Strategies" Please respond to the following:
  • Examine and explain four security strategies used for firewalls.  Explain the two that you would highly recommend being implemented.  Provide a rationale for your response. 


ANS:

"Firewall Security Strategies" Please respond to the following:
  • Examine and explain four security strategies used for firewalls.  Explain the two that you would highly recommend being implemented.  Provide a rationale for your response. 
Unified threat management (UTM) is the deployment of a firewall as an all-encompassing primary gateway security solution. The idea behind UTM is that you can use a single device to perform firewall filtering, IPS, antivirus scanning, anti-spam filtering, VPN endpoint hosting, content filtering, load balancing, detailed logging, and potentially other security services, performance enhancements, or extended capabilities. UTM has its advantages, mainly in the ability to deploy a single product and manage multiple security services from a single interface.
CIS 534 Week 6 Discussion 2

No comments:

Post a Comment

Note: only a member of this blog may post a comment.

FIN 317 Financing an Expansion Assignment

  FIN 317 Financing an Expansion Assignment   Financing an Expansion Overview After 12 years, your business is wildly successful, with multi...