Jun 15, 2018
Network security has been forced to evolve, as attacks have
shifted from attacking the network directly to infecting systems
inside the network, typically by exploiting vulnerabilities in
applications and servers; or by taking advantage of social
engineering to gain a foothold through email and compromised
websites. Over time, organizations have been forced to add
additional network security appliances to their network perimeter
for intrusion prevention, web filtering, anti-spam and remote
access (VPN). The UTM (Unified Threat Management) appliance evolved
out of the burden of managing
an array of network security products.
We use the internet every day, all the computers in the office
are connected to the internet and our computers are home to our
data, whether it be personal or business. How do you keep the
internet bad guys out and let the good guys in?
Today Tony Leggio from SOPHOS chats with Barb Paluszkiewicz about
Firewalls and Unified Threat Management.