没有合适的资源?快使用搜索试试~ 我知道了~
资源推荐
资源详情
资源评论
www.juniper.net/veer
8
IT must contend with a complex security
landscape characterized by increasingly
sophisticated attacks, regulatory
requirements, a proliferation of new and
unmanaged network devices, and an
increasingly diverse and mobile workforce.
Enterprises not only need to control what
users do once they’re admitted to the
network, but also to identify, mitigate,
and report on any suspicious activity.
The ultimate goal is a security solution
that coordinates defenses across the
network in real time.
To date, security systems—firewalls,
intrusion detection and prevention
systems (IDP/IPS), data leakage
prevention (DLP), and others—have
operated as silos. Except for a few
vendor-proprietary implementations,
these security platforms have lacked
the ability to communicate with one
another to coordinate a meaningful
threat response.
With the new IF-MAP protocol and
extensions to the TNC architecture that
Developed by Trusted Computing Group
and dubbed the Interface for Metadata
Access Point (IF-MAP), this new standard
allows for the dynamic interchange of data
among a wide range of networking and
security devices. With IF-MAP, systems
can share real-time data about policies,
status, and behavior for continuous policy
decision-making and enforcement based
on an endpoint’s security state.
As a result, enterprises can implement
a multi-vendor security system that
delivers coordinated defense-in-depth.
IF-MAP gives enterprises greater vendor
choice and the flexibility to leverage their
investments in existing network and
security infrastructure. In addition,
IF-MAP enables more robust security
by supporting real-time threat response
and granular identity-based controls,
resulting in less downtime and data loss.
And IT will find it easier to define secu-
rity policies, troubleshoot incidents, and
generate compliance reports, reducing
operations overhead.
Beyond network access control
IF-MAP builds on and significantly extends
the benefits of existing security standards,
such as those defined for network access
control (NAC). Widespread vendor support
for NAC standards, for example, has made
it possible for enterprises to combine LAN
switches, identity management, and host
posture check software from multiple
vendors into a solution that best aligns
with their needs and budget. Key among
NAC standards are the Trusted Computing
Group’s Trusted Network Connect (TNC)
architecture for endpoint security and IEEE
802.1X, which provides port-based access
control for wired and wireless networks.
NAC is crucial in protecting corporate
assets from unauthorized users and
preventing infected devices from
connecting to the network. But, like a
moat around a castle, NAC is only one
piece of a defense-in-depth strategy; it’s
of little help if a spy slips inside the castle
walls or an attacker comes equipped with
a trebuchet and long ladders.
NEW STANDARD LAYS
THE FOUNDATION FOR
COORDINATED,
MULTIVENDOR
SECURITY
TECHNOLOGY
FEATURE
From Ethernet to HTML, standardization of IT technologies has ultimately
led to more choice, greater system interoperability, and lower costs for enterprises.
The security market is no exception. Later this year, leading vendors will begin delivering
products that support a new security standard that opens the door to powerful, multi-vendor
defense-in-depth solutions.
资源评论
书香度年华
- 粉丝: 1w+
- 资源: 383
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 爱心树LoveTree代码
- preg-match绕过.txtpreg-match绕过.txtpreg-match绕过.txtpreg-match绕过.txt
- SLAM-基于C++实现的具有深度特征的实时SLAM系统实现-附项目源码-优质项目分享.zip
- 愚蠢小熊猫.txt愚蠢小熊猫.txt愚蠢小熊猫.txt
- Screenshot_2024-05-19-09-54-17-66_8d5670488565e26b7916974914990c3c.jpg
- STM32车牌识别源码+原理图+演示视频.zip
- 770347463069912软件2.apk
- Java ASM,learn-java-asm-main.zip
- asm字节插桩asm-master.zip
- 显示模组 瀚彩1.44+ST7735 SPI演示程序STM32(Keil)
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功