ClubEnsayos.com - Ensayos de Calidad, Tareas y Monografias
Buscar

Manual Palo Alto


Enviado por   •  23 de Marzo de 2014  •  200 Palabras (1 Páginas)  •  387 Visitas

Tech-savvy users are spending more and more time on their favorite website or using the latest and greatest web application. This unfettered web surfing and application use exposes organizations to security and business risks including propagation of threats, possible data loss, and lack of regulatory or internal policy compliance.

Stand-alone URL filtering solutions are insufficient control mechanisms because they are easily bypassed with external proxies (PHproxy, CGIproxy), translation sites (Google Translate, Bing Translator), search engine caches (Google Search, Internet Archive), circumventors (Tor, UltraSurf, Hamachi) and remote desktop access tools (GoToMyPC, RDP, SSH). Controlling users’ application activity requires a integrated approach that implements policies to control web activity and the applications that are commonly used to bypass traditional security mechanisms.

Palo Alto Networks® next-generation firewalls natively classifies all traffic, inclusive of applications, threats and web content, then ties that traffic to the user, regardless of location or device type. The application, content and user, the business elements that run your business, are then used as the basis of all security policies. By addressing the lack of visibility and control from both the application and web content perspective, your organization is safeguarded from a full spectrum of legal, regulatory, productivity, and resource utilization risks.

...

Descargar como (para miembros actualizados)  txt (1.4 Kb)  
Leer 1 página más »
Disponible sólo en Clubensayos.com