FEATURE: MULTI-LAYERED SECURITY
databases, and applications.
Remote Access
• Control access to corporate assets
from remote users, branch sites,
partners, and contractors.
• Assure a VPN with strong
authentication and encryption is
used to verify credentials and assure
transmissions are protected.
• Limit access through trusted sites
by trusted users and devices only,
making sure improper access over
the gateway VPN is not obtained by
unauthorized users.
One of the weakest links in the security
chain is Email – which is the preferred
channel for business communications
and thus continues to be a vector
www.intelligentcio.com
of choice for attackers. Hence, when
companies within the region evaluate
security or revisit what they already
have, they should be sure to ask the
following questions for more effective
protection against spam, blended
threats, and targeted attacks:
1. How do you deal with the
variety of types of spam and
viruses? We all know that there is
no such thing as 100% protection
but we can reach the 99%+ range by
layering and integrating multiple antispam engines and multiple anti-virus
engines. A security architecture that
tightly integrates multiple engines
and allows them to automatically and
seamlessly work together not only
increases protection levels but also
INTELLIGENTCIO
43