Implementation of a perimeter security system as an information security strategy
Abstract:
This paper presents the implementation of a perimeter security system, maintaining the integrity, confidentiality and availability of information, protecting the systems from internal and external threats. The importance of information security, at a time when the worldwide trend in threats continues to grow and information is exposed to any entity that has sufficient resources to access it, in this context, for implementation was proposed to make a technological renewal with virtualized equipment that can expand capacity when necessary and maintain its effectiveness in controlling threats. In addition, to work in HA (High Availability) in the two data centers, presenting a topology with four teams. The implemented teams apply policies in real time, working with URL filtering modules, IPS, antimalware, antivirus, sandboxing and application control, obtaining as a result an effective protection to the entire technological platform of the institution.
Año de publicación:
2020
Keywords:
- Perimeter
- SYSTEM
- Implementation
- security
- VIRTUAL
Fuente:

Tipo de documento:
Article
Estado:
Acceso restringido
Áreas de conocimiento:
- Red informática
- Ciencias de la computación
Áreas temáticas:
- Programación informática, programas, datos, seguridad
- Otros problemas y servicios sociales
- Dirección general