Page 1 of 1
distribute bandwidth across multiple servers. Provides fault tolerance so server outages have no effect.
Access Point
Load Balancer
DLP
SIEM
logs all security events across all devices. Usually includes advanced reporting and logs.
Mail Gateway
DLP
SIEM
Access Point
sits between users and the external network. Receives the user requests and sends the request on their behalf
Proxy
Mail Gateway
Access Point
DLP
Encrypts and decrypts network traffic from remote location
NIPS
Firewall
VPN Concentrator
Switch
It’s used to control the flow of traffic, to prevent bad traffic from coming to the inside of your network, and in some cases, to keep bad traffic from leaving your network.
VPN Concentrator
Firewall
SIEM
DLP
A list of rules that the firewall checks and allows or disallows traffic based upon.
DLP
NIPS
ACL
SIEM
Switch configuration that’s taking traffic from the wireless network and switching it on to the Ethernet network
Load Balancer
Proxy
Firewall
Access Point
Attracts hackers to come and hack and can make them think that this is a whole separate company while keeping yours safe. Needs to look real so bad guys cant tell they are trapped in a virtual environment
Network Scanner
Exploitation Framework
Banner Grabbing
Honeypot
technique used to gain information about a computer system on a network and the services running on its open ports. Administrators can use this to take inventory of the systems and services on their network.
Honeypot
Banner Grabbing
Exploitation Framework
Vulnerability Scanner
This will find as much info as possible about Operating Systems and patches to see where there might be weak spots in the network. This is active but minimally invasive to the network.
Protocol Analyzer
Penetration Testing
Honeypot
Vulnerability Scanner
all in one security appliance
SIEM
HIPS
UTM
Firewall
Stops data leakage and is meant to show where important data is going out of your network
DLP
WAF
UTM
AV
Page 1 of 1