Implementation of a perimeter security system as an information security strategy


Abstract:

This paper presents the implementation of a perimeter security system, maintaining the integrity, confidentiality and availability of information, protecting the systems from internal and external threats. The importance of information security, at a time when the worldwide trend in threats continues to grow and information is exposed to any entity that has sufficient resources to access it, in this context, for implementation was proposed to make a technological renewal with virtualized equipment that can expand capacity when necessary and maintain its effectiveness in controlling threats. In addition, to work in HA (High Availability) in the two data centers, presenting a topology with four teams. The implemented teams apply policies in real time, working with URL filtering modules, IPS, antimalware, antivirus, sandboxing and application control, obtaining as a result an effective protection to the entire technological platform of the institution.

Año de publicación:

2020

Keywords:

  • Perimeter
  • SYSTEM
  • Implementation
  • security
  • VIRTUAL

Fuente:

scopusscopus

Tipo de documento:

Article

Estado:

Acceso restringido

Áreas de conocimiento:

  • Red informática
  • Ciencias de la computación

Áreas temáticas:

  • Programación informática, programas, datos, seguridad
  • Otros problemas y servicios sociales
  • Dirección general