Security Web gateway assessment: 10 questions that enterprises should be aware

Source: Internet
Author: User

Security Web gateway assessment: 10 questions that enterprises should be aware
After you understand the advantages and disadvantages of the secure Web gateway device, you need to evaluate whether the technology is suitable for your environment. The following are 10 questions that enterprises should think clearly to determine whether security Web gateway (SWG) is good for enterprises and a complete SWG Supplier List for reference. 10 questions for Enterprises

1. What threats do we have to worry about? Have we performed risk assessment? Please note that you need to select a function based on the most urgent problem to be solved.

2. Do we have internal professionals to deploy and manage products? Do we need to increase assistance to help us "survive the storm", or choose hosting service providers to be more cost-effective?

3. Does our company produce advanced intellectual property products? Do we need to check the inbound and outbound content?

4. Are we worried about cross-fishing and other targeted attacks? Foreign attack targets or enterprises that need to worry about advanced continuous threats will need to pay attention to these types of attacks.

5. Do our companies prefer hardware devices? Software? Is software-as-a-service-based services more attractive?

6. Do we only focus on keeping users away from malicious websites, or are we worried that social apps will reduce production efficiency? These two factors highlight the difference between controlling users and controlling applications.

7. Are we looking for products because we are not satisfied with the existing products? Our existing products do not work in terms of performance or functionality? Remember, changing a device requires more preparation than scaling a device.

8. Do we need to monitor encrypted traffic, its related overhead, and potential performance degradation? Please note that this issue requires special deployment and performance analysis.

9. Are we trying to block internal interactions that reduce production efficiency, such as spam, social media, and streaming media, or are we more focused on blocking attackers, such as anti-malware and phishing attacks?

10. How do we protect remote users, VPNs, and mobile devices? How can we provide remote accounts and mobile services?

Vendors

• A10 Networks
• Actiance
• Barracuda Networks
• Blue Coat Systems
• Cisco Systems
• Clearswift
• Dell
• Fortinet
• McAfee
• Phantom Technologies
• Safenet
• SmoothWall
• Sophos
• Symantec
• Trustwave Holdings
• Untangle
• Webroot
• Websense
• Zscaler

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.