Two Approaches .to Securing
Enterprise Transaction
Focus “Moat Around the Castle” Granular Protection
Product Firewalls SSL
Categories Intrusion Detection PKI
Virus Scanners VPN
Advantages Simple! Reflects Real World
Intuitive Security Requirements
Previous slide
Next slide
Back to first slide
View graphic version
Author
|
Title
|
Track
|
Home
Send email to Interex
or to the
Webmaster
©Copyright 1999
Interex
. All rights reserved.