Run on firewall systems between networks. Client systems establish connections to a destination service via the application gateway or proxy, which mediates the transactions.
Comprising software and hardware solutions that provide authentication, authorization, and audit functionality for networked resources and applications through the use of certificates, centralized passwords, tokens, and other authentication mechanisms.
Network, server, and client-based tools that support an organization’s policies and business processes for accessing, managing, organizing, and controlling access to various forms of networked information.
Systems that ensure each host in a networked environment presents a degree of security meeting corporate standards for firewall, antivirus, patches, data security, audit, and other compliance aspects of the organization’s overall security strategy.
IDS & IPS
Detect, report on, and neutralize network-based attacks by recognizing and blocking malicious activity. Active blocking systems stop attacks before damage occurs and provide detailed reporting that assists the organization to prevent similar, future attacks.
Traffic Management/WAN Acceleration
Systems that prioritize, accelerate, shape, and intelligently route network traffic to ensure that critical applications remain available and maximize the utility of available network resources.
Systems and tools that enforce corporate policies at the network level. Systems that help protect against unauthorized access and abuse by providing convergence for authentication, authorization, audit, and resource access management. VPNs provide secure communications across networks, between remote locations, across the Internet, and between server environments.
Systems and tools that address security risks from new applications and networking technologies, enabling the organization to securely take advantage of more efficient business processes. The tools range from secure wireless systems to monitoring and management tools that provide fundamental security and availability for an organization’s infrastructure.