...
首页> 外文期刊>Computer Technology Review >Network Configuration Management
【24h】

Network Configuration Management

机译:网络配置管理

获取原文
获取原文并翻译 | 示例
           

摘要

With the increased num-ber of cyber attacks and the overall complexity of enterprise networks today, IT professionals are challenged with the daunting task of protecting networks from known and unknown malicious activity. To combat network security issues, many organizations are deploying a layered security architecture that spans from the Internet to the desktop. The typical network security solutions companies deploy include firewalls, intrusion detection systems, anti-virus software, etc. Many organizations also utilize vulnerability assessments, penetration tests and other means to identify network vulnerabilities. While traditional security solutions and services are being deployed to protect the network, devices continue to fall victim to attacks. As a result, many organizations are looking outside the "security application box" to other solutions that can more effectively secure, manage and maintain critical devices throughout the network. One particular application category IT professionals are turning to is Network Configuration Management.
机译:随着当今网络攻击数量的增加和企业网络的整体复杂性,保护网络免受已知和未知恶意活动的艰巨任务使IT专业人员面临挑战。为了解决网络安全问题,许多组织都在部署从Internet到台式机的分层安全体系结构。公司部署的典型网络安全解决方案包括防火墙,入侵检测系统,防病毒软件等。许多组织还利用漏洞评估,渗透测试和其他手段来识别网络漏洞。在部署传统的安全解决方案和服务来保护网络的同时,设备继续成为攻击的受害者。结果,许多组织将目光投向“安全应用程序框”之外的其他解决方案,这些解决方案可以更有效地保护,管理和维护整个网络中的关键设备。 IT专业人员正在寻求的一种特殊应用类别是网络配置管理。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号