My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
Item 14 - Purchase of Firewall Hardware and Services
Clerk
>
Agenda Packets / Staff Reports
>
City Council (2004 - Present)
>
2024
>
08/20/2024
>
Item 14 - Purchase of Firewall Hardware and Services
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
8/14/2024 3:45:40 PM
Creation date
8/14/2024 10:22:59 AM
Metadata
Fields
Template:
City Clerk
Doc Type
Agenda Packet
Agency
Information Technology
Item #
14
Date
8/20/2024
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
80
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
The Convergence of Networking and Security <br />Traditional networking lacks awareness of content, applications, users, devices, location and more. Organizations have overlaid <br />security solutions on to the network later to account for this shortcoming — but doing so has led to increased management <br />complexity, performance bottlenecks, poor user experience, and the potential introduction of new exploitable gaps or <br />vulnerabilities. A better Security -driven Networking approach converges networking and security into a single, accelerated <br />solution. A specially designed operating system and security processors work in concert to greatly improve network <br />performance and security posture, adding greater awareness while also improving user experience, easing management <br />complexity, and decreasing footprint and power consumption. <br />Networking <br />000 <br />Appliances Lack <br />Awareness <br />Security <br />g <br />Device <br />O <br />O OI <br />�IOo <br />User <br />Content <br />Application <br />Q A <br />0-1-0 <br />d b <br />Location <br />N O 0 <br />Software Delivers <br />Network Awareness <br />Security -Driven Networking <br />l7 <br />o <br />\ <br />ZTNA <br />(WLA'N/LAN <br />oo©X o00cure <br />NGFW <br />SD -WAN <br />SWG <br />.10 <br />s'u Q , <br />' Appliance ' vM SaaS <br />------------- <br />Consolidation of Vendors and Point Solutions to a Platform <br />Cybersecurity has traditionally been deployed one solution at time, in response to each emerging problem or challenge. <br />However, individual security solutions — typically from a new vendor — are not designed to work well with the other deployed <br />solutions. With meaningful levels of cross -vendor integration and automation proving difficult to achieve, management <br />complexity is massively increased, and effective response to new threats is simply too slow. A more effective approach is to <br />consolidate point product vendors into a cybersecurity platform, allowing for much tighter integration, increased automation, <br />and a more rapid, coordinated, and effective response to threats across the network. <br />Cybersecurity Platform Approach <br />20 Vendors <br />4 <br />4-6 Platforms <br />
The URL can be used to link to this page
Your browser does not support the video tag.