Monday, December 27, 2010

【 Weak current College 】 embedded firewall for each door with a lock



Traditional firewall only anti-surrounding
Traditional edge firewall only on the enterprise network perimeter security provided. The edge firewall traffic from the external Internet access to internal LAN implementation of filtering and censorship. However, they cannot ensure the security of enterprise LAN internal access. It can be compared to a building's door with a lock, but Office building in each room but the door wide open, once someone has passed the gates of the Office building, you can freely access any room in the Office building. Such networks are vulnerable to targeted attacks. For example, hackers have already access to a corporate local area network computers, once you get control of this computer, they will be able to use this machine as a springboard for invasion of other systems.
Embedded firewall for each door with a lock
Improved security of office building in example above, the most basic solution is for building each room configuration is a key and a padlock. Similarly, the latest generation of security with distribution programme will firewall features to the network of desktop systems, laptops, and server PC. Distributed throughout the company's embedded firewall migration and users can easily access the information, without the rest of the network are exposed to potential illegal intruder. With this end-to-end security, performance, user via intranet, extranet, virtual private network or remote access to the Internet with the enterprise is no longer any difference. Distributed firewall can also prevent the enterprise due to a single endpoint system intrusion and spread to the entire network, but also through public account logon network users cannot access those that restrict access of a computer system.
Who needs to be embedded firewall
Although all companies should all be concerned about security, but some more to see. The store private information or proprietary information, and rely on this information, in particular to the operation of enterprises, a set of powerful and reliable security processing programs, such as government agencies, financial institutions, insurance services, high technology developers as well as various medical institutions. For these security requirements are higher, the software-based treatment programmes, such as personal firewall and anti-virus scanner, etc, are not strong enough to meet user's requirements. Because even if an email sent from the malicious script can easily apply these protective shielding off, even the essentials are those that run on the host of "friendly" may be used to prevent the driver conflict and inadvertently turn off the security protection software. Once these software systems fail, the terminal will be very vulnerable to attack. Even more frightening is that other parts of the network will also be under threat in the attack.
Because of safety performance by hardware processor rather than a software to assume, therefore, the edge firewall using programs or gateway to such users with better means of intrusion preparedness. However, as previously mentioned, these devices are limited to provide security for the network edge. A set of embedded firewall processing programmes could incorporate this function extends to the edges from the scope of the firewall, and distribution to the network Terminal. Edge firewall can provide avoidance strategy, you can also provide intrusion preparedness strategies. Security Essentials in the PC system, but by embedded firewall hardware systems, the entire process is independent of the host system. This strategy allows enterprise network almost without any malicious code or hacker attacks. Even if an attacker fully adopted the firewall protection and control of the host running the firewall, they will move forward because they cannot shut down an embedded firewall, or to the invasion of the host to springboard to further expand into other areas of the network.
At the same time, an embedded firewall security treatment programmes can be accessed at home for those who need company LAN remote office users to defend. As most households in the Internet services run on the opening of links, and does not have advanced security means to defend the family PC computers are vulnerable to hackers. If the Home Office staff use a DSL router or cable modem, they faced network security crisis will be greater. These "always online" broadband link than dial-up modem more vulnerable to attack, because they make the computer 24 hours a day and the Internet to keep the Internet. Telephone dial-up service is typically the user each time you access the Internet when a user is assigned a new IP address, but broadband service provider usually each user is assigned a long fixed Internet addresses, allowing hackers easy "lock" their computer.
3Com embedded firewall Crystal three brains
3Com Corporation provides the user with industry-leading distributed network hardware-based security products. 3Com company has and the famous Sidewinder firewall product manufacturers, in the field of safety skills with more than 20 years experience of SecureComputing company formed a partnership to jointly produce 3Com embedded firewall processing programme (3ComEmbeddedFirewallsolution). As a set of skills to support Firewall network adapter hardware and security management software product of the product, treatment of 3Com embedded firewall can use 3Com10/100 secure server network card (3Com10/100SecureServerNIC), 3Com10/100 security card (3Com10/100SecureNIC) and 3Com embedded firewall policy server implementation (3ComEmbeddedFirewallPolicyServer).
3Com embedded firewall processing programme is designed to address and improve various security capacity of the enterprise edge firewall, antivirus programs, host-based intrusion detection using the program, as well as alarm program designed for the network agent, it ensures enterprise-internal and external network has the following features: regardless of the enterprise LAN topology how to change the protection essentials can extend toNetwork edge network provides hardware-based security; and preparedness of the security features can be independent of the host operating system and other security programs running; even in less secure broadband link can implement secure mobile and remote access; manageable implementation forms enable enterprise security can be user policy rather than physical facilities to perform.

No comments:

Post a Comment