Firewall Wizards mailing list archives
Re: enterprise security management
From: "Anton A. Chuvakin" <anton () chuvakin org>
Date: Fri, 21 Feb 2003 10:24:31 -0500 (EST)
Simon,
The most imortant feature is policy enforcement, compliance checking and monitoring.
Just curious, what do you precisely mean by "policy enforcement"? Do you want to check for policy violations such as unauthorized machines, services, modems, connections, software, etc or specific behaviors that violate/attempt to violate a policy? Or do you want to enforce the policy? In the latter case, a firewall is probably the solution - however, I suspect that is not what you are looking for. Please clarify. Best, -- Anton A. Chuvakin, Ph.D., GCIA http://www.chuvakin.org http://www.info-secure.org _______________________________________________ firewall-wizards mailing list firewall-wizards () honor icsalabs com http://honor.icsalabs.com/mailman/listinfo/firewall-wizards
Current thread:
- enterprise security management SimonChan (Feb 20)
- Re: enterprise security management Anton A. Chuvakin (Feb 21)
- <Possible follow-ups>
- Re: enterprise security management Antonomasia (Feb 21)