Alcatel Voice over WLAN (R1.1.1) Specifications Page 67

  • Download
  • Add to my manuals
  • Print
  • Page
    / 80
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 66
All Rights Reserved © Alcatel-Lucent 2012 Page 68
Once the voice and data fabric are secured and appropriate fine grained controls are in place, the
next consideration is to target directly specific applications that require extra special treatment. This
is followed by solutions to protect the mobile user and mobile assets of the corporation, such as
laptops.
User-centric security deployment
Perimeter security
Choosing a perimeter security solution usually implies different choices according to the various
types of enterprises. It is also greatly dependent on security strategy.
If an enterprise prefers to follow a best-of-breed approach to threat
management - then separate solutions are required for firewall/VPN,
anti-virus, anti-malware and web filtering. If an integrated approach to
threat management is preferred, then a unified threat management
and firewall solution is attractive.
If an enterprise has many independent branch offices, an integrated
solution which includes routing functionality, referred to as a security
router, is an approach to be considered.
In today’s network, a web application firewall is a must to protect web
servers and web-facing applications. One overall consideration in
controlling security operations costs is scalability and manageability of
the perimeter solution chosen, especially for enterprises with many
locations to protect.
Network access control
Page view 66
1 2 ... 62 63 64 65 66 67 68 69 70 71 72 ... 79 80

Comments to this Manuals

No comments