Project Main Details
2008-06-10 23:20:11 GMT 2008-06-11 14:41:43 (GMT -05:00) Eastern Time (US & Canada) Yes (click here to learn more about ) Closed - Note: This project was manually closed by the voice seeker before it reached its original deadline. 48 48 0 direct invitation(s) have been sent by the voice seeker resulting in 0 audition(s) and/or proposal(s) so far. Voice123 SmartCast is seeking 50 auditions and/or proposals for this project (approx.) Invitations sent by SmartCast have resulted in 48 audition(s) and/or proposal(s) so far.
• Audio files must be delivered via FTP/Dropbox/Google Drive/cloud
Remember the days when you could arrive at an airport and walk directly up to your gate? The world has indeed changed over the last several years as airport security continues to grow with overlapping layers of security.
Your organization should be changing too. With the ever increasing complexity of potential threats, your network, just like an airport, needs to be protected at each layer of potential risk.
Think for a minute about your typical airport experience. When you first arrive at the airport you need to head straight to the ticket counter to identify yourself and request a boarding pass. Once your identity has been verified, you can then check your bags and proceed to your gate.
In the same way, when someone wants to enter your network, the first thing they need to do is authenticate at the network edge by logging in.
Now once you have received a boarding pass, you head straight to the security checkpoint where you and your belongings are scanned for potentially dangerous items.
In your network, once a user has been authenticated their device should be checked for possible security threats. It’s at this point that existing viruses, missing security patches, or other vulnerabilities on the user’s computer can be identified.
Once you pass the security checkpoint, you are granted access to your gate. However you are only allowed to enter areas designated for the public. Pilots, airline crew, and airport personnel may be granted access to areas of the airport that the travelling public is not allowed to see.
In a similar way, users inside your network should not be granted access to all resources. Instead approved users paired with approved devices should be granted privileges based on their access rights.
As you make your way to your gate, your luggage is being processed for transport. During this processing, each of your items is scanned for compliance with airport security guidelines.
And just as your luggage is scanned in the background, network “luggage”, or data, needs to be continually checked for dangerous anomalies. And if anomalies of any kind are detected during network usage, those anomalies need to be immediately removed and placed in quarantine.
Another important security measure that all airports employ is continuous video surveillance. The careful monitoring and recording of behavior and events inside the airport provide points of reference and review in the event of a security breach.
Same with your network. Monitoring and recording of user activity is needed to ensure compliance with security regulations and proper risk mitigation.
At each layer within your network security framework ************** offers solutions designed to fit your needs. Intended to deliver comprehensive end-to-end network security frameworks or point solutions inside a multi-vendor network, **************** security portfolio is…
comprehensive because it provides multiple solutions at each layer,
modular because it can be built in layers one at a time, and
open because it is designed to integrate within multi-vendor networks.
When it comes to network security, failure often leads to headlines. Don’t fail. N/A
Voice123 Team Comments
Voice123 consultations with this voice seeker regarding this project and/or other projects by this voice seeker, via phone, chat, and/or email.
This project - phone.
Previous projects - phone.
This project - email or chat.
Previous projects - email or chat.
Corporate web site for this voice-seeker confirmed by Voice123
Note: Voice123 strives to establish the legitimacy of all projects posted. However, Voice123 subscribers and users are responsible for confirming information stated by prospective voice seekers, agents and/or clients. Voice123 subscribers and users assume all liability for use of any information found through Voice123, or any of its publications.
This page contains the most important details of this project. If you find the information on this project inaccurate or inappropriate, please let us know by contacting us.