Overlay network for security policies
One way to ensure the security of business transactions, customer data and intellectual property is to use IPSec to provide data encryption and authentication services. However, the management of IPSec policies and the Internet Key Exchange protocol - which is used for the authentication of end nodes and the creation of the IPSec security associations - present some practical deployment limitations. These constraints can be addressed using a three-layer approach to security.
[ Read more ]
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.