Information Security Leader, Author, Instructor and Speaker

Auditing Firewall Activity

Posted on October 17, 2007 in Articles | by

In the first three parts of this series, we explored choosing a firewall platform, choosing an appropriate topology, and placing systems within that topology.

Read the full article: Auditing firewall activity

Published in SearchSecurity on 10/17/07

TAGS: ,

Leave a Reply

Your email address will not be published. Required fields are marked *

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple