Security - Misuse Detection
Many attempted intrusions go undetected
Active monitoring
Common patterns
Static and dynamic configuration examination
Content inspection
Aggregated network tools
Previous slide
Next slide
Back to first slide
View graphic version
Author
|
Title
|
Track
|
Home
Send email to Interex
or to the
Webmaster
©Copyright 1999
Interex
. All rights reserved.