Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Network Security Devices

10

Flashcards

0/10

Still learning
StarStarStarStar

Email Security Gateway

StarStarStarStar

Purpose: To protect against email-based threats. Common Features: Spam filtering, Virus and malware scanning, Data loss prevention.

StarStarStarStar

Data Loss Prevention (DLP) System

StarStarStarStar

Purpose: To detect and prevent data breaches and exfiltration. Common Features: Sensitive data identification, Access control policies, Incident response capabilities.

StarStarStarStar

Virtual Private Network (VPN) Gateway

StarStarStarStar

Purpose: To establish secure, encrypted connections over the internet. Common Features: Encryption, Tunneling protocols, Access control.

StarStarStarStar

Antivirus/Anti-Malware Software

StarStarStarStar

Purpose: To detect, prevent, and remove malware. Common Features: Real-time scanning, Automatic updates, Heuristic analysis.

StarStarStarStar

Security Information and Event Management (SIEM)

StarStarStarStar

Purpose: To provide real-time analysis of security alerts. Common Features: Event correlation, Log management, Automated alerting.

StarStarStarStar

Intrusion Prevention System (IPS)

StarStarStarStar

Purpose: To prevent identified threats from carrying out their intended actions. Common Features: Real-time protection, Automatic response to threats, Inline traffic processing.

StarStarStarStar

Web Application Firewall (WAF)

StarStarStarStar

Purpose: To protect web applications by filtering and monitoring HTTP traffic. Common Features: Customizable rulesets, Protection against common exploits, Real-time traffic monitoring.

StarStarStarStar

Firewall

StarStarStarStar

Purpose: To block unauthorized access to or from a private network. Common Features: Packet filtering, Stateful inspection, Proxy service.

StarStarStarStar

Intrusion Detection System (IDS)

StarStarStarStar

Purpose: To detect and alert on potential security breaches. Common Features: Signature-based detection, Anomaly detection, Monitoring network traffic.

StarStarStarStar

Network Access Control (NAC)

StarStarStarStar

Purpose: To restrict the access to a network based on identity and compliance with security policies. Common Features: Policy enforcement, Host health checks, Guest networking access.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.