digital online pvt ltd

Page 24

• Centralized, policy-based management minimizes the chance of overlooking security holes by simplifying roll-out and network-wide updates

• Virtualization technologies make it easy for administrators to divide the network into secure segments for additional protection.

• Rapid Deployment features help minimize repetitive tasks and administrative burden associated with wide spread deployments.

3.6.2.4 Security Software Software firewalls provide strong and transparent protection against intrusions and malicious attacks. Software based security solutions offer flexible deployment in a cost-effective manner. Link3 Technologies Ltd. offers its customers comprehensive security features at low cost maximizing their ROI (return on investment). These software based security systems are intuitive, intelligent and complete solutions that focus on today's busy professionals. These solutions are custom implemented to protect business assets and transactions by ensuring secure connections with the Internet and between networks. As a comprehensive hybrid firewall, it enables fast, controlled connectivity, providing strong and transparent protection against intrusions and malicious attacks. Key points: •

Provides proactive security and protects the network against ‘blended threats’ by default

Full Application Inspection technology enables the inspection of data deep inside packets passing through the security gateway, providing enterprise-class protection for both application- and network-level attacks

Centralized management simplifies managing network security through centralized logging, alerting, reporting, and policy configuration

Meets performance requirements with integrated high availability and load balancing option

Extensive platform support, for Windows and Solaris

Seamless VPN integration to securely connect remote offices and users

3.6.2.5

SSL VPN & SSL Certificates

Secure Sockets Layer (SSL) is a cryptographic protocol to provide secure communications on the Internet. These protocols provide endpoint authentication and communications privacy over the Internet using cryptography. The protocols allow


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.