Unified Threat Management

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 276 Experts worldwide ranked by ideXlab platform

Syed Jafar Naqvi - One of the best experts on this subject based on the ideXlab platform.

  • ICEBE - Unified Threat Management System Approach for Securing SME's Network Infrastructure
    2012 IEEE Ninth International Conference on e-Business Engineering, 2012
    Co-Authors: M. H. A. Lawati, Syed Jafar Naqvi
    Abstract:

    For many smaller and larger entities over the last couple of decades, information systems and technologies have become an integral part of their operations and played a major role in drastically changing and often improving their business processes. As computers become more and more integrated into our business organizations, we end up leaving and storing confidential, vital business and sensitive information on them. In general, larger organizations have the technical expertise and resources to better secure computing services. The Small to Medium Enterprises (SMEas), however, often lack the platforms, infrastructure, technical expertise, and the required financial resources to be able to utilize modern secure technologies for computing services. This paper discussed the importance of network security, analyzed different type of Threats to network infrastructure, different methodologies that can be used to mitigate network infrastructure Threats and have proposed an approach for securing SMEas network infrastructure. This approach suggested Unified Threat Management (UTM) as the first line of protection to the network, based on the links between each distribution switch layers which offers a zone based monitoring and controlling system to prevent the network from any possible Threats.

  • Unified Threat Management system approach for securing sme s network infrastructure
    International Conference on e-Business Engineering, 2012
    Co-Authors: Saqib Ali, M. H. A. Lawati, Syed Jafar Naqvi
    Abstract:

    For many smaller and larger entities over the last couple of decades, information systems and technologies have become an integral part of their operations and played a major role in drastically changing and often improving their business processes. As computers become more and more integrated into our business organizations, we end up leaving and storing confidential, vital business and sensitive information on them. In general, larger organizations have the technical expertise and resources to better secure computing services. The Small to Medium Enterprises (SMEas), however, often lack the platforms, infrastructure, technical expertise, and the required financial resources to be able to utilize modern secure technologies for computing services. This paper discussed the importance of network security, analyzed different type of Threats to network infrastructure, different methodologies that can be used to mitigate network infrastructure Threats and have proposed an approach for securing SMEas network infrastructure. This approach suggested Unified Threat Management (UTM) as the first line of protection to the network, based on the links between each distribution switch layers which offers a zone based monitoring and controlling system to prevent the network from any possible Threats.

M. H. A. Lawati - One of the best experts on this subject based on the ideXlab platform.

  • ICEBE - Unified Threat Management System Approach for Securing SME's Network Infrastructure
    2012 IEEE Ninth International Conference on e-Business Engineering, 2012
    Co-Authors: M. H. A. Lawati, Syed Jafar Naqvi
    Abstract:

    For many smaller and larger entities over the last couple of decades, information systems and technologies have become an integral part of their operations and played a major role in drastically changing and often improving their business processes. As computers become more and more integrated into our business organizations, we end up leaving and storing confidential, vital business and sensitive information on them. In general, larger organizations have the technical expertise and resources to better secure computing services. The Small to Medium Enterprises (SMEas), however, often lack the platforms, infrastructure, technical expertise, and the required financial resources to be able to utilize modern secure technologies for computing services. This paper discussed the importance of network security, analyzed different type of Threats to network infrastructure, different methodologies that can be used to mitigate network infrastructure Threats and have proposed an approach for securing SMEas network infrastructure. This approach suggested Unified Threat Management (UTM) as the first line of protection to the network, based on the links between each distribution switch layers which offers a zone based monitoring and controlling system to prevent the network from any possible Threats.

  • Unified Threat Management system approach for securing sme s network infrastructure
    International Conference on e-Business Engineering, 2012
    Co-Authors: Saqib Ali, M. H. A. Lawati, Syed Jafar Naqvi
    Abstract:

    For many smaller and larger entities over the last couple of decades, information systems and technologies have become an integral part of their operations and played a major role in drastically changing and often improving their business processes. As computers become more and more integrated into our business organizations, we end up leaving and storing confidential, vital business and sensitive information on them. In general, larger organizations have the technical expertise and resources to better secure computing services. The Small to Medium Enterprises (SMEas), however, often lack the platforms, infrastructure, technical expertise, and the required financial resources to be able to utilize modern secure technologies for computing services. This paper discussed the importance of network security, analyzed different type of Threats to network infrastructure, different methodologies that can be used to mitigate network infrastructure Threats and have proposed an approach for securing SMEas network infrastructure. This approach suggested Unified Threat Management (UTM) as the first line of protection to the network, based on the links between each distribution switch layers which offers a zone based monitoring and controlling system to prevent the network from any possible Threats.

Saqib Ali - One of the best experts on this subject based on the ideXlab platform.

  • Unified Threat Management system approach for securing sme s network infrastructure
    International Conference on e-Business Engineering, 2012
    Co-Authors: Saqib Ali, M. H. A. Lawati, Syed Jafar Naqvi
    Abstract:

    For many smaller and larger entities over the last couple of decades, information systems and technologies have become an integral part of their operations and played a major role in drastically changing and often improving their business processes. As computers become more and more integrated into our business organizations, we end up leaving and storing confidential, vital business and sensitive information on them. In general, larger organizations have the technical expertise and resources to better secure computing services. The Small to Medium Enterprises (SMEas), however, often lack the platforms, infrastructure, technical expertise, and the required financial resources to be able to utilize modern secure technologies for computing services. This paper discussed the importance of network security, analyzed different type of Threats to network infrastructure, different methodologies that can be used to mitigate network infrastructure Threats and have proposed an approach for securing SMEas network infrastructure. This approach suggested Unified Threat Management (UTM) as the first line of protection to the network, based on the links between each distribution switch layers which offers a zone based monitoring and controlling system to prevent the network from any possible Threats.

Mike Massing - One of the best experts on this subject based on the ideXlab platform.

  • Three Phases for a Secure Wireless Network
    SonicWALL Secure Wireless Network Integrated Solutions Guide, 2007
    Co-Authors: Joe Levy, Khai Tran, Patrick Lydon, Jeremy Pollock, Dave Parry, Susan Weigand, Zhong Chen, John Gmuender, Mike Massing
    Abstract:

    This chapter divides the implementation of a complete secure wireless network into three phases: Unified Threat Management (UTM) gateway and wireless access, secure remote access, and centralized Management. By dividing the implementation into three phases, a clear view of how the SonicWALL product line fits together to form a single, integrated network solution is achieved. The phased approach also helps a network designer determine which elements the network requires. This chapter explains all of the concepts necessary to understand the implementation sections that follow. Phase one covers the configuration of gateway devices with UTM security services and then the addition of wireless service. SonicWALL's UTM services use the deep packet inspection (DPI) engine to examine both the header and body of every packet that enters the network. Phase two covers VPN solutions that add secure remote access to the network. SonicWALL provides both client and clientless solutions, with several options for extra security such as two-factor authentication (2FA) and one-time passwords (OTPs). Phase Three adds centralized Management and monitoring for larger networks. SonicWALL Global Management System (GMS) allows a single network administrator to remotely configure an entire network consisting of multiple appliances located in multiple remote sites from a single local Management interface.

  • Introduction to Secure Wireless Networking
    SonicWALL Secure Wireless Network Integrated Solutions Guide, 2007
    Co-Authors: Joe Levy, Khai Tran, Patrick Lydon, Jeremy Pollock, Dave Parry, Susan Weigand, Zhong Chen, John Gmuender, Mike Massing
    Abstract:

    This chapter provides an introduction to wireless technology and communications. Wireless devices such as cell phones, PDAs, and laptop computers provide mobility to users and enable them to keep in constant contact with both their work and personal lives. Modern wireless network communication essentially began in 1997 with the original 802.11 standard. In 1999, Wired Equivalency Protection (WEP) was introduced as the first attempt at a secure algorithm for wireless networks. By 2001, serious security flaws were found in WEP. Wi-Fi Protected Access (WPA) was introduced in 2003 as a stopgap measure that superseded WEP, and was quickly followed by WPA2 in 2004, which fully implemented the 802.11i standard. Other wireless standards have been introduced for wireless bridging, Quality of Service, vehicular use, microwave access, and cellular access. Malware is an umbrella term for all forms of malicious software—viruses, worms, botnets, and other Threats. Modern day malware is a much more serious criminal Threat to both wired and wireless networks. SonicWALL Unified Threat Management (UTM) provides content filtering, intrusion prevention, antivirus, and antispyware at the gateway. Wireless networks are susceptible to specialized Threats that compromise access points, jam radio frequencies, and take advantage of the physical mobility of wireless devices. Although wireless security Threats have multiplied with the phenomenal increase in Internet usage, network administrators demand the same level of security from a wireless network that they expect from a wired network. The WPA2 standard has eliminated any excuse for accepting inherent vulnerabilities in wireless networks.

Hussain Al-aqrabi - One of the best experts on this subject based on the ideXlab platform.

  • Securing Manufacturing Intelligence for the Industrial Internet of Things
    Advances in Intelligent Systems and Computing, 2020
    Co-Authors: Hussain Al-aqrabi, Richard Hill, Phil Lane, Hamza Aagela
    Abstract:

    Widespread interest in the emerging area of predictive analytics is driving the manufacturing industry to explore new approaches to the collection and Management of data through Industrial Internet of Things (IIoT) devices. Analytics processing for Business Intelligence (BI) is an intensive task, presenting both a competitive advantage as well as a security vulnerability in terms of the potential for losing Intellectual property (IP). This article explores two approaches to securing BI in the manufacturing domain. Simulation results indicate that a Unified Threat Management (UTM) model is simpler to maintain and has less potential vulnerabilities than a distributed security model. Conversely, a distributed model of security out-performs the UTM model and offers more scope for the use of existing hardware resources. In conclusion, a hybrid security model is proposed where security controls are segregated into a multi-cloud architecture.

  • Securing Manufacturing Intelligence for the Industrial Internet of Things
    arXiv: Cryptography and Security, 2019
    Co-Authors: Hussain Al-aqrabi, Richard Hill, Phil Lane, Hamza Aagela
    Abstract:

    Widespread interest in the emerging area of predictive analytics is driving industries such as manufacturing to explore new approaches to the collection and Management of data provided from Industrial Internet of Things (IIoT) devices. Often, analytics processing for Business Intelligence (BI) is an intensive task, and it also presents both an opportunity for competitive advantage as well as a security vulnerability in terms of the potential for losing Intellectual Property (IP). This article explores two approaches to securing BI in the manufacturing domain. Simulation results indicate that a Unified Threat Management (UTM) model is simpler to maintain and has less potential vulnerabilities than a distributed security model. Conversely, a distributed model of security out-performs the UTM model and offers more scope for the use of existing hardware resources. In conclusion, a hybrid security model is proposed where security controls are segregated into a multi-cloud architecture.

  • IT Security and Governance Compliant Service Oriented Computing in Cloud Computing Environments
    Principles Methodologies and Service-Oriented Approaches for Cloud Computing, 2013
    Co-Authors: Hussain Al-aqrabi, Lu Liu
    Abstract:

    The authors present the key security challenges and solutions on the Cloud with the help of literature reviews and an experimental model created on OPNET that is simulated to produce useful statistics to establish the approach that the Cloud computing service providers should take to provide optimal security and compliance. The literature recommends the concept of Unified Threat Management for ensuring secured services on the Cloud. Through the simulation results, the authors demonstrate that UTM may not be a feasible approach to security implementation as it may become a bottleneck for the application Clouds. The fundamental benefits of Cloud computing (resources on demand and high elasticity) may be diluted if UTMs do not scale up effectively as per the traffic loads on the application Clouds. Moreover, it is not feasible for application Clouds to absorb the performance degradation for security and compliance because UTM will not be a total solution for security and compliance. Applications also share the vulnerabilities just like the systems, which will be out of UTM Cloud’s control.

  • SOSE - Business Intelligence Security on the Clouds: Challenges, Solutions and Future Directions
    2013 IEEE Seventh International Symposium on Service-Oriented System Engineering, 2013
    Co-Authors: Hussain Al-aqrabi, Richard Hill, Lu Liu, Zhijun Ding, Nikolaos Antonopoulos
    Abstract:

    Business intelligence (BI) is a critical software system employed by the higher Management of organizations for presenting business performance reports through Online Analytical Processing (OLAP) functionalities. BI faces sophisticated security issues given its strategic importance for higher Management of business entities. Scholars have emphasized on enhanced session, presentation and application layer security in BI, in addition to the usual network and transport layer security controls. This is because an unauthorized user can gain access to highly sensitive consolidated business information in a BI system. To protect a BI environment, a number of controls are needed at the level of database objects, application files, and the underlying servers. In a cloud environment, the controls will be needed at all the components employed in the service-oriented architecture for hosting BI on the cloud. Hence, a BI environment (whether self-hosted or cloud-hosted) is expected to face significant security overheads. In this context, two models for securing BI on a cloud have been simulated in this paper. The first model is based on securing BI using a Unified Threat Management (UTM) cloud and the second model is based on distributed security controls embedded within the BI server arrays deployed throughout the Cloud. The simulation results revealed that the UTM model is expected to cause more overheads and bottlenecks per OLAP user than the distributed security model. However, the distributed security model is expected to pose administrative control effectiveness challenges than the UTM model. Based on the simulation results, it is recommended that BI security model on a Cloud should comprise of network, transport, session and presentation layers of security controls through UTM, and application layer security through the distributed security components. A mixed environment of both the models will ensure technical soundness of security controls, better security processes, clearly defined roles and accountabilities, and effectiveness of controls.

  • ISORC Workshops - Investigation of IT Security and Compliance Challenges in Security-as-a-Service for Cloud Computing
    2012 IEEE 15th International Symposium on Object Component Service-Oriented Real-Time Distributed Computing Workshops, 2012
    Co-Authors: Hussain Al-aqrabi, Nick Antonopoulos, Richard Hill, Lu Liu, Yongzhao Zhan
    Abstract:

    The key security challenges and solutions on the cloud have been investigated in this paper with the help of literature reviews and an experimental model created on OPNET that is simulated to produce useful statistics to establish the approach that the cloud computing service providers should take to provide optimal security and compliance. The literatures recommend the concept of Security-as-a-Service using Unified Threat Management (UTM) for ensuring secured services on the cloud. Through the simulation results, this paper has demonstrated that UTM may not be a feasible approach to security implementation as it may become a bottleneck for the application clouds. The fundamental benefits of cloud computing (resources on demand and high elasticity) may be diluted if UTMs do not scale up effectively as per the traffic loads on the application clouds. Moreover, it is not feasible for application clouds to absorb the performance degradation for security and compliance because UTM will not be a total solution for security and compliance. Applications also share the vulnerabilities just like the systems, which will be out of UTM cloud's control.