networking , security

Next Generation Real-time Network Defense

January 11, 2010

Requirements:

  1. Near Continuous Scanning
  2. System Change Alerts
  3. Identify “unmanaged” nodes on network
  4. Receive frequent vulnerability updates
  5. Ongoing monitoring for baseline compliance, vulnerabilities, and threats
  6. Standards-based interface to firewall, anti-virus and intrusion prevention systems to support rapid shielding

https://www.bestitdocuments.com/Samples