[Accueil] [Sommaire] [Réseau] [Attaques] [Solutions] [Périmètre] [Intranet] [Cloisonnement de Réseau] [Cas_Intranet] [Marketing] [Infogérance] [Conclusion] [Resources]
[début] La sécurité appliquée globalement (2/2) [précédent] [suivant]
Fragmented, Device-Based  Centralized, Policy-Based 
Security setting is not coherent between devices Security setting is coherent by design
Security setting becomes static Policy is up to date
Impossible to enforce the policy Enables policy enforcement
Doesn't protect against internal threats Protects from internal attacks
Difficult to secure mobile users Makes mobility security easier

  Network Security Managment must be Centralized and Policy-Based  

*********************************************************************
HSC ® © Hervé Schauer Consultants 1990-2000 - 4bis Rue de la Gare - 92300 Levallois-Perret
Téléphone : +33 141 409 700 - Télécopie : +33 141 409 709 - Courriel : <secretariat@hsc.fr>
- Page 26 -