Palo Alto Networks – What is Network Segmentation? 3.13 3.13.5 System and Communications Protection
Defines network segmentation and the difference between logical and physical network segmentation and the use cases for it.
Defines network segmentation and the difference between logical and physical network segmentation and the use cases for it.
This article explains the definition, appliances, email filtering techniques, and solutions.
This article describes several video conferencing security best practices.
This sample policy from SANS provides guidance that limits the use of encryption to those algorithms that have received substantial public review and have been proven to work effectively.
This SANS provided policy outlines the requirements for protecting encryption keys that are under the control of end users.
This sample policy provided by SANS can be customized and used to address remote access.
This SANS checklist provides a generic listing of security considerations to be used when auditing the technical aspects of a firewall.
This whitepaper from SANS discusses firewall and perimeter protections focusing on defense-in-depth.
This SANS whitepaper discusses the use of Public Key Infrastructure (PKI) to meet business, regulatory, and compliance requirements.
This whitepaper from SANS gives an overview of how Public Key Infrastructure (PKI) can be distilled into two critical parts: a public and a private key.