Firewall Wizards mailing list archives

Re: enterprise security management


From: "Anton A. Chuvakin" <anton () chuvakin org>
Date: Fri, 21 Feb 2003 10:24:31 -0500 (EST)

Simon,

The most imortant feature is policy enforcement, compliance checking and
monitoring.
Just curious, what do you precisely mean by "policy enforcement"? Do you
want to check for policy violations such as unauthorized machines,
services, modems, connections, software, etc or specific behaviors that
violate/attempt to violate a policy?

Or do you want to enforce the policy?  In the latter case, a firewall is
probably the solution - however, I suspect that is not what you are
looking for.

Please clarify.

Best,
-- 
  Anton A. Chuvakin, Ph.D., GCIA
     http://www.chuvakin.org
   http://www.info-secure.org


_______________________________________________
firewall-wizards mailing list
firewall-wizards () honor icsalabs com
http://honor.icsalabs.com/mailman/listinfo/firewall-wizards


Current thread: