Análise de soluções UTM e ameaças digitais

Registro completo de metadados
MetadadosDescriçãoIdioma
???dc.contributor.advisor???: dc.contributor.advisorForonda, Augusto-
Autor(es): dc.contributor.authorBasso, Douglas Eduardo-
Data de aceite: dc.date.accessioned2015-08-06T23:12:25Z-
Data de aceite: dc.date.accessioned2017-03-17T14:45:06Z-
Data de disponibilização: dc.date.available2015-08-06T23:12:25Z-
Data de disponibilização: dc.date.available2017-03-17T14:45:06Z-
Fonte completa do material: dc.identifierhttp://repositorio.roca.utfpr.edu.br/jspui/handle/1/3758-
???dc.identifier.citation???: dc.identifier.citationBASSO, Douglas Eduardo. Análise de soluções UTM e ameaças digitais. 2015. 70 f. Trabalho de Conclusão de Curso (Especialização) – Universidade Tecnológica Federal do Paraná, Curitiba, 2015.pt_BR
Fonte: dc.identifier.urihttp://www.educapes.capes.gov.br/handlecapes/172710-
Resumo: dc.description.abstractIn a not-so-distant past, business users passively accessing the information of the company in its terminals and workstations. With the arrival of the notebooks, it was possible to have greater mobility, which grew exponentially with the adoption of smartphones and tablets, as well as increasing personal productivity, bring the much vaunted "freedom", free of restrictive security policies of companies. The technology grew, the computers and users have evolved and the internet has changed. This change brought many benefits: services in the cloud, social networks, communication between people, online shopping, banking, among others. All this not only in the personal computer, but also in the corporate environment. Some of these applications have become indispensable in our daily lives, they are: Skype, Google Docs, Facebook, Youtube, Twitter and many other services. But how to manage all this? Separate solutions have limited visions of traffic, or even the use of old technologies and current with the concept of "all or nothing" are no longer effective. There is no longer as simply block access to all these corporate applications, but allow access not inspected even if for specific groups, as is usually done nowadays, poses a serious threat to the security of enterprise networks. Arise then new requirements for a firewall. Within this context we can highlight the UTM firewalls which is a new comprehensive network security technology which became the main corporate protection solution in recent years. Roughly, the UTM security is the evolution of the traditional firewall for a more robust security solution and complete, able to perform multiple functions in a single device: network firewalling, network intrusion prevention, anti-virus, anti-spam filtering, VPN, load balancing, data leak prevention, among others.pt_BR
Palavras-chave: dc.subjectBanco de dados - Medidas de segurançapt_BR
Palavras-chave: dc.subjectFirewalls (Medidas de segurança de computadores)pt_BR
Palavras-chave: dc.subjectRedes de computadores - Gerênciapt_BR
Palavras-chave: dc.subjectData base securitypt_BR
Palavras-chave: dc.subjectFirewalls (Computer security)pt_BR
Palavras-chave: dc.subjectComputer networks - Managementpt_BR
Título: dc.titleAnálise de soluções UTM e ameaças digitaispt_BR
Tipo de arquivo: dc.typeoutropt_BR
Aparece nas coleções:Repositorio Institucional da UTFPR - RIUT

Não existem arquivos associados a este item.