Accurate and positive identification of network users, hosts, applications, services, and resources is a must. Kerberos, password tools, and protocols such as RADIUS and TACACS+ enable identification.
This enables you to control access to network applications, data, and services so only authorised users and information can pass through the network.
Data privacy is the providing of confidential data on command to authorised users while protecting that information from eavesdropping or tampering. Tunnelling, encryption technologies, and protocols like IPSec provide important protection when implementing Virtual Private Networks (VPNs).
You also should regularly test and monitor security preparations. By being proactive, you can identify areas of weakness and make adjustments. When a real security event occurs, you’ll be ready.
It’s likely your network will grow in size and complexity. You’ll need centralised policy-management tools that use directory services to grow with the network. These tools define, distribute, enforce, and audit the security policy through browser interfaces, plus they enhance the usability and effectiveness of your network’s security solutions.