Atenção: Todas as denúncias são sigilosas e sua identidade será preservada.
Os campos nome e e-mail são de preenchimento opcional
Metadados | Descrição | Idioma |
---|---|---|
???dc.contributor.advisor???: dc.contributor.advisor | Foronda, Augusto | - |
Autor(es): dc.contributor.author | Basso, Douglas Eduardo | - |
Data de aceite: dc.date.accessioned | 2015-08-06T23:12:25Z | - |
Data de aceite: dc.date.accessioned | 2017-03-17T14:45:06Z | - |
Data de disponibilização: dc.date.available | 2015-08-06T23:12:25Z | - |
Data de disponibilização: dc.date.available | 2017-03-17T14:45:06Z | - |
Fonte completa do material: dc.identifier | http://repositorio.roca.utfpr.edu.br/jspui/handle/1/3758 | - |
???dc.identifier.citation???: dc.identifier.citation | BASSO, Douglas Eduardo. Análise de soluções UTM e ameaças digitais. 2015. 70 f. Trabalho de Conclusão de Curso (Especialização) – Universidade Tecnológica Federal do Paraná, Curitiba, 2015. | pt_BR |
Fonte: dc.identifier.uri | http://www.educapes.capes.gov.br/handlecapes/172710 | - |
Resumo: dc.description.abstract | In a not-so-distant past, business users passively accessing the information of the company in its terminals and workstations. With the arrival of the notebooks, it was possible to have greater mobility, which grew exponentially with the adoption of smartphones and tablets, as well as increasing personal productivity, bring the much vaunted "freedom", free of restrictive security policies of companies. The technology grew, the computers and users have evolved and the internet has changed. This change brought many benefits: services in the cloud, social networks, communication between people, online shopping, banking, among others. All this not only in the personal computer, but also in the corporate environment. Some of these applications have become indispensable in our daily lives, they are: Skype, Google Docs, Facebook, Youtube, Twitter and many other services. But how to manage all this? Separate solutions have limited visions of traffic, or even the use of old technologies and current with the concept of "all or nothing" are no longer effective. There is no longer as simply block access to all these corporate applications, but allow access not inspected even if for specific groups, as is usually done nowadays, poses a serious threat to the security of enterprise networks. Arise then new requirements for a firewall. Within this context we can highlight the UTM firewalls which is a new comprehensive network security technology which became the main corporate protection solution in recent years. Roughly, the UTM security is the evolution of the traditional firewall for a more robust security solution and complete, able to perform multiple functions in a single device: network firewalling, network intrusion prevention, anti-virus, anti-spam filtering, VPN, load balancing, data leak prevention, among others. | pt_BR |
Palavras-chave: dc.subject | Banco de dados - Medidas de segurança | pt_BR |
Palavras-chave: dc.subject | Firewalls (Medidas de segurança de computadores) | pt_BR |
Palavras-chave: dc.subject | Redes de computadores - Gerência | pt_BR |
Palavras-chave: dc.subject | Data base security | pt_BR |
Palavras-chave: dc.subject | Firewalls (Computer security) | pt_BR |
Palavras-chave: dc.subject | Computer networks - Management | pt_BR |
Título: dc.title | Análise de soluções UTM e ameaças digitais | pt_BR |
Tipo de arquivo: dc.type | outro | pt_BR |
Aparece nas coleções: | Repositorio Institucional da UTFPR - RIUT |
O Portal eduCAPES é oferecido ao usuário, condicionado à aceitação dos termos, condições e avisos contidos aqui e sem modificações. A CAPES poderá modificar o conteúdo ou formato deste site ou acabar com a sua operação ou suas ferramentas a seu critério único e sem aviso prévio. Ao acessar este portal, você, usuário pessoa física ou jurídica, se declara compreender e aceitar as condições aqui estabelecidas, da seguinte forma: