7. Conclusion
Thanks to this article and the one on installing an application relay, an administrator can now deploy a complete solution enabling secure (through virus and offensive site filtering) and controlled (through authentication mechanisms) access to the Internet. In addition, the production of dashboards and usage reports provides both a high-level and granular view of solution usage. Last but not least, complementary tools enable parameter settings to be fine-tuned for optimum performance.
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Conclusion
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources