Securing your Servers
Powertech Network Security uses exit point technology to intercept traffic passing through the IBM exit points for 30 servers. It provides two essential functions: auditing and access control.
The procedure for securing your servers, and keeping them secure, has been subdivided into the following general steps:
- Discovery, Data Collection, and Analysis
- Adding the Initial Rule Set
- Recursive Data Collection, Review, and Analysis
- Adding, Changing, and Deleting User Rules
- Public Lockdown
- Oversight Review
- Granulating Rules for Specific Needs
- Ongoing Auditing
- Keeping Network Security Up-to-Date