Community Platform
Interests
  • Cloud computing
  • Data analytics
  • Data science
  • JavaScript
  • more...
This Year
305 Points
Total
705 Points
MIS Badge

Click here
to validate the recipient

Top 5 Ways to Deploy Web Content Security

Notes:

Network Configurations 

  • ICMP- reports messages of connectivity issues 
  • Firewalls 
  • Ip spoof with WCCP 

 

WSA(web security appliance)- has features and configurations for additionally security on a website 

  • Can be used for IP spoofing prevention, distribution of network services 
  • Talos telemetry- responsible for monitoring threats in an environment, all data sent is stored in a data center. 
  • DNS- widely used protocol, DNS servers are applied for additional security 
  • Authentications-  
  • Active- logins, single, or two factor authentication 
  • Passive- finger print or Ip retrieval

Services configuration 

  • Web(gateway for users and the internet) or Https(available channel after server is verified) Proxys 
  • Layer four traffic monitor- monitors network traffic between the main and end system 

 

Policy configuration 

  • Complexity- the more complex the more time is spent evaluating a file. Very complex policies can result in slowed response time on the website for users 
  • Identification profiles- all criteria must match to access the profile first IE (user agent, applications, or objects

Logging 

  • Traffic from client’s side, external services, internal services, and the server side 
Skip to toolbar