|
To Contact Me |
|
Phone: 07768 113497 Fax: 01473 423491 |


|
Global Enterprise Real-Time Intruder Management Console |
|
Home Page | Network Penetration Testing | Firewall and VPN Engineering | Network Design | Security Policy | Network Support | Employment / Contract History | CV and References | Personal |

|
Next.. |
|
Next.. |
|
The enterprise IT infrastructure includes the population of security devices, network devices, applications, databases, and servers to be monitored in real-time. In addition, it may include other systems that, in turn, monitor or assess other components from the IT infrastructure for example, vulnerability scanners. Communication between tiers is of course secure and encrypted. The agents in use on security devices are configurable to virtually any device. |