|
The popular image of the corporate firewall is a
The challenge is to provide each of the many constituencies with secure access
while accommodating their inevitably conflicting rights, responsibilities and
needs. In short, an organization must ensure internal security and regulatory
conformance, while still allowing staff, salesmen, and contractors appropriate
access to internal and external systems as needed.
The needs and requirements of typical constituencies will be examined. Ways to
maintain ease of use and its attendant reduction in Total Cost of Ownership
(TCO) will be explored. Our review will include the benefits and limitations of
firewalls, SSL, HTTPS, VPNs, proxy servers, authentication, and WiFi
(802.11a/b/g).
Mr. Gezelter holds MS and BA degrees from New York University in Computer
Science. In addition to his contributions on Internet and WWW Security to The
Computer Security Handbook, 4th (and 3rd) Editions, his published articles have
appeared in HP's OpenVMS Technical Journal, Network World, Open Systems Today,
Digital Systems Journal, Digital News, and Hardcopy.
Mr. Gezelter can be reached via email at
gezelter@removethis.rlgsc.com.
|
Questions to:
webmaster@removethis.rlgsc.com