MBA Alumni | MBA Students | MBA Aspirants | MBA Forums
--- MBA Home ---

CoolAvenues.com

offers
Advertising
Services

on the web  
 

Home     |    MBA Jobs      |     Knowledge Zone      |     Seminars      |     Placement Report      |     Admission Alert       |     café     |     Search

Technology Management | Enterprise Security Consultancy Market in India

Technology @ Knowledge Zone

 Home

 Knowledge Zone Home

 General Management

 Finance

 Marketing

 Human Resource

 System

 Operations

 Knowledge Seminar

 MBA Forums
 Search
 Join e-Communities
 Be a CoolAssociate
 Give Suggestions

 Company Search
 
 

Subscribe:
Seminar & MDP Alert
   To keep yourself updated with the latest Seminars & MDP happenings in the country, join Knowledge Seminar& MDP mailing lists.


Latest Management Discussion on CoolAvenues Forums



Enterprise Security Consultancy Market in India

by Prasun Goel *

Previous

Page - 4

An organization will usually work with a security consultant to draft its security policy. The policy takes into account existing threats and vulnerabilities as well as future threats.

Some of the components that a security policy needs to address are:

  • Regular audits of the security posture and policy to identify any new threats and vulnerabilities.

  • Secure firewalls, patched servers, strong authentication, deployed/updated antivirus solutions, denial of service filters, password policy and well-written applications add to a secure end-to-end solution.

  • Enterprise Security Solutions

    A few years back, a conversation on security solutions was generally limited to Antivirus products or security features within the operating system. Today security solutions are available for every stage of the network. These can be broadly categorized as:

    Vulnerability/Risk Assessment Tools

    They help in identifying vulnerabilities and likelihood of damage, and provide possible defensive measures. E.g. - Cybercop scanner from Network Associates (NAI) checks the system against a database of 750 vulnerabilities, and generates reports. The software identifies holes in network and gives reports in a graphical format indicating high, medium and low-risk cases.

    Firewalls

    Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.

    Nortel offers Alteon Switch Firewall (ASF). Integrated in Layer 4 switches, the ASF offers 4.2 Gbps throughput and has firewall and content screening capabilities.

    Virtual Private Network

    Many companies are creating VPNs (virtual private networks) to accommodate the needs of telecommuters and distant offices. VPN is a private network that uses a public network (usually the Internet) to connect remote sites or users together. VPN uses 'virtual' connections routed through the Internet from the remote site/employee to the company's private network.

    Next


    * Contributed by: -
    Prasun Goel,
    PGDM (2nd Year)
    Symbiosis Centre for Management and Human Resource Development,
    SCMHRD, Pune


    Post Your Comments       |       E-mail to Friend       |       Want to Contribute

    Send this E-mail this Article

     

    MBA Jobs
    MBA Preparation
    B-Schools
    MBA Forums
    About CoolAvenues
    Senior Mgmt Jobs CAT / MAT/ CET Dean talk CAT Preparation Post a Job
    Finance Jobs Admission Alert B-School Profile Executive MBA Advertise with Us
    Marketing Jobs MBA Insider B-School Diary Career Help Contact us
    HR MBA Jobs MBA Admission Process Summer GMAT Privacy
    Operations MBA Jobs English Preparation MBA News Companies Copyrights
    IT MBA Jobs MBA Abroad MBA Events B-Schools About CoolAenues
    Consulting MBA Jobs CAT / MAT / CET test papers MBA Placements Summer Guidance
    Resume Design Tips MBA in India Summers Guide Classifieds

    © All Copyrights exclusive with Zebra Networks
    Part or full of the contents can not be published, copied or reproduced
    in any form without the prior written exclusive permission of Zebra Networks. Pls refer to CoolAvenues Copyright section.