Serial number |
Brief introduction |
01 |
The network storm again, NGFW born |
02 |
the martial arts big become out of rivers and lakes, First world fame knows |
03 |
flow through the wall, virus does not release----anti-virus characteristic principle |
Geneva |
flow through the wall, virus does not release----anti-virus feature configuration |
to |
cyber threats fascinating eye, perspicacious anti-intrusion---IPs feature principle |
. |
Network threats fascinating eye, perspicacious anti-intrusion---IPs feature configuration |
- |
Mass web site difficult to pursuit, classified control Jing wei ming---url filtering characteristics principle |
, |
Mass web site difficult to pursuit, classified control Jing wei Ming---URL filtering feature configuration |
the |
e-Mail is a small need for governance, two-pronged solution to the problem---mail filtering characteristics principle |
Ten |
e-mail is small need to govern, two-pronged solution to the problem---mail filtering feature configuration |
One |
file leaks are difficult to prevent, double swords and show divinity---file filtering and content filtering characteristics principle |
A |
file leaks are difficult to protect, dual sword and display of the---file filtering and content filtering feature configuration |
- |
application behavior change, granularity control has method---application (HTTP and FTP) behavior Control Chapter |
- |
defying clouds to cover the flow, the practice of burner application---Application of recognition characteristics of the principle and configuration |
the |
Strategic management is difficult, commissioning operations have a sharp weapon---security policy deployment guidance |
- |
preventive measure, in addition to---network Security analysis report |
- |
IP is becoming attractive eye, authentication can distinguish the---user and authentication basis |
- |
IP fading eye, authentication can distinguish the---built-in portal authentication |
+ |
IP is becoming attractive eye, authentication can distinguish the---external portal authentication |
- |
IP is becoming attractive eye, authentication can distinguish the---single sign-on |