Análise de soluções UTM e ameaças digitais
In a not-so-distant past, business users passively accessing the information of the company in its terminals and workstations. With the arrival of the notebooks, it was possible to have greater mobility, which grew exponentially with the adoption of smartphones and tablets, as well as increasing per...
Autor principal: | Basso, Douglas Eduardo |
---|---|
Formato: | Trabalho de Conclusão de Curso (Especialização) |
Idioma: | Português |
Publicado em: |
Universidade Tecnológica Federal do Paraná
2020
|
Assuntos: | |
Acesso em linha: |
http://repositorio.utfpr.edu.br/jspui/handle/1/17316 |
Tags: |
Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
|
Resumo: |
In a not-so-distant past, business users passively accessing the information of the company in its terminals and workstations. With the arrival of the notebooks, it was possible to have greater mobility, which grew exponentially with the adoption of smartphones and tablets, as well as increasing personal productivity, bring the much vaunted "freedom", free of restrictive security policies of companies. The technology grew, the computers and users have evolved and the internet has changed. This change brought many benefits: services in the cloud, social networks, communication between people, online shopping, banking, among others. All this not only in the personal computer, but also in the corporate environment. Some of these applications have become indispensable in our daily lives, they are: Skype, Google Docs, Facebook, Youtube, Twitter and many other services. But how to manage all this? Separate solutions have limited visions of traffic, or even the use of old technologies and current with the concept of "all or nothing" are no longer effective. There is no longer as simply block access to all these corporate applications, but allow access not inspected even if for specific groups, as is usually done nowadays, poses a serious threat to the security of enterprise networks. Arise then new requirements for a firewall. Within this context we can highlight the UTM firewalls which is a new comprehensive network security technology which became the main corporate protection solution in recent years. Roughly, the UTM security is the evolution of the traditional firewall for a more robust security solution and complete, able to perform multiple functions in a single device: network firewalling, network intrusion prevention, anti-virus, anti-spam filtering, VPN, load balancing, data leak prevention, among others. |
---|