Information Security Leader, Author, Instructor and Speaker

Auditing Firewall Activity

Posted on October 17, 2007 in Articles | by

In the first three parts of this series, we explored choosing a firewall platform, choosing an appropriate topology, and placing systems within that topology.

Read the full article: Auditing firewall activity

Published in SearchSecurity on 10/17/07

TAGS: ,

Leave a Reply

Your email address will not be published. Required fields are marked *