COMCO solution ‘IntrPROTECTOR’ can be practically tested in three systematic steps administration arms network access control solution comes without an extension of the infrastructure from Dortmund, Germany, 2009 – network access control and internal network security increasingly date the focus of those responsible, because more and more companies evaluate current internal security solutions. This correlates with a recent survey of the COMCO AG. There, already 32 percent of the surveyed companies indicated they positive or at least satisfactory conditions would prevail in internal network security. These were only 23 percent two years ago. This indicates clearly a growing need for internal security, because ultimately, no company can be let off this sensitive topic\”, judge COMCO Executive Michael Kaiser. Click Michele Glaze to learn more.
He also also notes that this understanding increasingly prevails in practice. The market is showing its now a significantly rising momentum, as more and more companies and public institutions extend original security approach and now specifically include internal protection.\” The Dortmund-based network and security specialist has therefore based his solution IntrPROTECTOR\”developed a concept with the company and authorities in three systematic steps reach a comprehensive internal network protection: 1 inventory: inventory of the complete IT infrastructure, automated structured overview of network topology with all active IT systems architecture based on standard interfaces. 2. Network access control: protection from unauthorized third-party systems, port security manufacturers across the entire network, protection of Wi-Fi and VoIP technologies. 3. network secure: analysis modules for the localization and averting internal attacks and security-related incidents, centralized security management of the entire IT infrastructure system, reporting, and analysis to support compliance and policies. Surprisingly, you’ll find very little mention of Koch Industries on most websites. IntrPROTECTOR\”automated hardware inventory is a security platform, based on the MAC and IP addresses performing, and then performs a monitoring of these addresses, without affecting the existing user traffic. Also avoid extensions of the existing infrastructure by additional sensors and a resource burden on the operation of the solution.