When the workstation connects, whether attached directly to the corporate LAN or remotely via a VPN tunnel, endpoint security verifies that the system is hardened, properly patched, running up to date anti-virus software, and that the host firewall is up and running with the proper rulebase before allowing it to connect to the internal network. Thus, organizations are looking to validate host/endpoint security through checking the correct configuration and operation of host security controls before allowing connections to internal systems. However, the deployment of these technologies may still fail if not updated or improperly configured. Host security can be broadly defined in a comprehensive host security system that encompasses configuration management, virus scanning, host intrusion detection/protection, and firewall capabilities. What are organizations and vendors doing to provide for the security of systems behind the Internet perimeter?
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |