Integrated Security Technologies and Solutions - Volume I: Cisco Security Solutions for Advanced Threat Protection with Next Generation Firewall, Intrusion ... Security (CCIE Professional Development) by Aaron Woland & Vivek Santuka & Mason Harris & Jamie Sanbower
Author:Aaron Woland & Vivek Santuka & Mason Harris & Jamie Sanbower [Woland, Aaron]
Language: eng
Format: azw3
Publisher: Pearson Education
Published: 2018-05-02T04:00:00+00:00
Figure 6-11 illustrates the bidirectional communication between a NGIPS device and the FMC.
Figure 6-11 FMC Communication
NGIPS Deployment Options
In today’s organizations, attacks come from everywhere. As networks evolve, many organizations struggle to have intrusion prevention or other security architecture evolve at the same pace. Visibility is everything: A NGIPS must be able to detect and respond to threats before they cause significant damage. Placement of NGIPS services is just as important as the rules and configuration that reside on the system. Where a NGIPS is placed is typically driven by compliance requirements (for example, PCI, HIPAA, NIST), risks, threats, and vulnerabilities specific to the organization. For example, a hospital might want to focus on protecting electronic health records (EHRs) and medical devices, which in turn would require NGIPSs in between all devices that store or process EHRs or medical devices. Some organizations might have connected devices that cannot be patched, such as an audiovisual system. NGIPS would be essential in reducing risk associated with any unpatched systems because those are the most susceptible to attacks and malware.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Deep Learning with Python by François Chollet(12724)
Hello! Python by Anthony Briggs(10021)
The Mikado Method by Ola Ellnestam Daniel Brolund(9893)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(9890)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(9884)
Dependency Injection in .NET by Mark Seemann(9432)
Hit Refresh by Satya Nadella(8878)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8404)
The Kubernetes Operator Framework Book by Michael Dame(8047)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7848)
Exploring Deepfakes by Bryan Lyon and Matt Tora(7830)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(7819)
Grails in Action by Glen Smith Peter Ledbrook(7787)
Practical Computer Architecture with Python and ARM by Alan Clements(7780)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(7745)
Robo-Advisor with Python by Aki Ranin(7735)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(7668)
Building Low Latency Applications with C++ by Sourav Ghosh(7634)
Svelte with Test-Driven Development by Daniel Irvine(7621)
