Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Lectures > Firewalls, protection and supervision, VPNs: situation of the security tools market
Go to: HSC Trainings
Version française
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o Training courses
o E-learning
o Agenda
o Past events
o Tutorials
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
o HSC Newsletter
o Press review
o Press releases
o Publications
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|Firewalls, protection and supervision, VPNs: situation of the security tools market  
> Access to the content HTML Beginning of the presentation  
> Description  
> Context & Dates Talk made at the Aristote seminar La sécurité des réseaux : sommes-nous toujours protégés ?, on 20 January 2000.
> Author Hervé Schauer (Herve.Schauer@hsc.fr) 
> Type 44 slides [ French - HTML ]  
> Abstract &
Table of content


Exemple d'encapsulation

Systèmes de Détection d'Intrusion
Le contrôle d'accès

Sécurité du périmètre
Le périmètre devient très difficile à cerner Plateforme de sécurité Internet Intégration des VPN Exemple d'ENX

Sécurité de l'Intranet

Exemples de problèmes
Solutions ?
Solution réaliste

Le cloisonnement de réseau
Qu'est-ce que le cloisonnement de réseau ?
La sécurité appliquée au niveau TCP/IP
La sécurité appliquée globalement
Est-ce que le cloisonnement de réseau satisfait tout le monde ?
Performance du cloisonnement de réseau
Scalabilité du cloisonnement de réseau
Limitations du cloisonnement de réseau
Évolutions futures de la sécurité Intranet

Exemple combinant filtrage IP et relayage applicatif
Cloisonnement HTTP
Exemple combinant filtrage IP et relayage applicatif




> Related documents
themeNetwork Security
[Presentation]  Forcasting in French cyberdefence doctrines [24 November 2010 - French]
[Presentation]  IPv6 Networks Discovery [30 May 2007 - French]
[Presentation]  IPv6: Network Security Threats [15 November 2006 - English]
[Presentation]  IPv6: impacts and threats [14 November 2006 - French]
[Presentation]  Manage IS security of wide enterprise [12 April 2005 - French]
[Presentation]  SSL VPN connection multiplexing techniques [7 April 2005 - English]
[Presentation]  Stakes of network security [31 March 2005 - French]
[Presentation]  Ethereal: an open-source network analyzer and a must-have security tool [2 February 2005 - French]
[Presentation]  Network security stakes [14 October 2004 - French]
[Techno-watch]  CanSecWest 2002 Conference [4 May 2002 - French]
[Presentation]  Network security: Introduction and Bluetooth [9 November 2000 - French]
[Article]  Networks Security [25 July 2000 - French]
[Presentation]  Policy managment for network security [29 May 2000 - French]
[Course]  TCP/IP Networks Security [25 November 1999 - French]
[Presentation]  Network security: intrusion risks and countermeasures [18 November 1999 - French]
[Presentation]  Network security techniques [6 March 1997 - French]
> Copyright © 2000, Hervé Schauer Consultants, all rights reserved.


Last modified on 17 April 2002 at 17:38:52 CET - webmaster@hsc.fr
Information on this server - © 1989-2010 Hervé Schauer Consultants