Professional Documents
Culture Documents
Log analysis system, to monitor traffic coming in and going out of the network.
RADIUS server implementation to manage access to internal networks, WiFi
networks, email services and VPN services.
A good password policy system would enforce length requirements, character
complexity, and check for the presence of dictionary words, which would
undermine the strength of passwords.
Solutions like Microsoft's SCCM or Puppet Labs which allow administrators to get
an overview of what software is installed across their fleet of many systems.
Patching software bugs that can lead to verbalities and perform software updates in
a timely manner.
define policies concerning file sharing, files extensions and their classification.
Employees education is also a determinant security factor to take inconsideration,
in remediating phishing, social engineering and other attacks.
3. Secure remote access for engineering employees
VPNs are recommended to provide secure access to internal resources for mobile
or roaming users. provide secure remote access, and link two networks securely
using VPN tunnel.
Or implementing a reverse proxy can be configured to allow secure remote access to
web-based services without requiring a VPN.
Layer 2 Tunneling Protocol is typically used to support VPNs. A common
implementation of L2TP is in conjunction with IPsec when data confidentially is
needed, since L2TP doesn't provide encryption itself.