SlideShare a Scribd company logo
1 of 20
NETWORK SECURITY
WHAT IS NETWORK SECURITY?
Network security is any activity designed to protect the usability
and integrity of your network and data.
It includes both hardware and software technologies
It targets a variety of threats
It stops them from entering or spreading on your network
Effective network security manages access to the network
BENEFITS OF NETWORK SECURITY
 Network Security is vital in protecting client data
and information, keeping shared data secure and
ensuring reliable access and network performance
as well as protection from cyber threats.
 TYPES OF NETWORK SECURITY PROTECTIONS
 Firewall
 Network Segmentation
 Remote Access VPN
 Zero Trust Network Access (ZTNA)
 Email Security
 Data Loss Prevention (DLP)
 Intrusion Prevention Systems (IPS)
 Sandboxing
 Hyperscale Network Security
 Cloud Network Security
 Robust Network Security Will Protect
Against
FIREWALL
 Firewall control incoming and outgoing
traffic on networks, with predetermined
security rules
NETWORK SEGMENTATION
 Network segmentation defines boundaries between
network segments where assets within the group
have a common function, risk or role within an
organization.
REMOTE ACCESS VPN
 Remote access VPN provides remote and
secure access to a company network to
individual hosts or clients, such as
telecommuters, mobile users, and extranet
consumers.
ZERO TRUST NETWORK ACCESS (ZTNA)
 The zero trust security model states that a user
should only have the access and permissions that
they require to fulfill their role.
EMAIL SECURITY
Email security refers to any processes,
products, and services designed to
protect your email accounts and email
content safe from external threats
DATA LOSS PREVENTION (DLP)
 Data loss prevention (DLP) is a cybersecurity
methodology that combines technology and best
practices to prevent the exposure of sensitive
information outside of an organization, especially
regulated data such as personally identifiable
information (PII) and compliance related data:
HIPAA, SOX, PCI DSS, etc.
INTRUSION PREVENTION SYSTEMS (IPS)
 IPS technologies can detect or prevent network
security attacks such as brute force attacks,
Denial of Service (DoS) attacks and exploits of
known vulnerabilities. A vulnerability is a
weakness for instance in a software system
and an exploit is an attack that leverages that
vulnerability to gain control of that system.
When an exploit is announced, there is often a
window of opportunity for attackers to exploit
that vulnerability before the security patch is
applied. An Intrusion Prevention System can be
used in these cases to quickly block these
attacks.
SANDBOXING
 Sandboxing is a cybersecurity practice where
you run code or open files in a safe, isolated
environment on a host machine that mimics end-
user operating environments. Sandboxing
observes the files or code as they are opened
and looks for malicious behavior to prevent
threats from getting on the network. For example
malware in files such as PDF, Microsoft Word,
Excel and PowerPoint can be safely detected
and blocked before the files reach an
unsuspecting end user.
HYPERSCALE NETWORK SECURITY
Hyperscale is the ability of an architecture
to scale appropriately, as increased
demand is added to the system. This
solution includes rapid deployment and
scaling up or down to meet changes in
network security demands. By tightly
integrating networking and compute
resources in a software-defined system, it
is possible to fully utilize all hardware
resources available in a clustering
solution.
CLOUD NETWORK SECURITY
Applications and workloads are no longer
exclusively hosted on-premises in a local
data center. Protecting the modern data
center requires greater flexibility and
innovation to keep pace with the
migration of application workloads to the
cloud. Software-defined Networking
(SDN) and Software-defined Wide Area
Network (SD-WAN) solutions enable
network security solutions in private,
public, hybrid and cloud-hosted Firewall-
as-a-Service (FWaaS) deployments.
ROBUST NETWORK SECURITY WILL
PROTECT AGAINST
Virus
Worms
Trojan
Spyware
Adware
Ransomware
VIRUS
A virus is a malicious, downloadable
file that can lay dormant that replicates
itself by changing other computer
programs with its own code. Once it
spreads those files are infected and
can spread from one computer to
another, and/or corrupt or destroy
network data.
WORMS
Can slow down computer networks by
eating up bandwidth as well as the
slow the efficiency of your computer to
process data. A worm is a
standalone malware that can
propagate and work independently of
other files, where a virus needs a host
program to spread.
TROJAN
A trojan is a backdoor program that
creates an entryway for malicious
users to access the computer system
by using what looks like a real
program, but quickly turns out to be
harmful. A trojan virus can delete files,
activate other malware hidden on your
computer network, such as a virus and
steal valuable data.
SPYWARE
Much like its name, spyware is a
computer virus that gathers
information about a person or
organization without their express
knowledge and may send the
information gathered to a third party
without the consumer’s consent.
ADWARE
Can redirect your search requests to
advertising websites and collect
marketing data about you in the
process so that customized
advertisements will be displayed
based on your search and buying
history.
RANSOMWARE
This is a type of trojan cyberware that
is designed to gain money from the
person or organization’s computer on
which it is installed by encrypting data
so that it is unusable, blocking access
to the user’s system.

More Related Content

Similar to NETWORK SECURITY dibyendu das.pptx

Computer security 7.pptx
Computer security 7.pptxComputer security 7.pptx
Computer security 7.pptxKhappiyo
 
Computing safety
Computing safetyComputing safety
Computing safetyBrulius
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Twobackdoor
 
Data protection and security
Data protection and securityData protection and security
Data protection and securitynazar60
 
System Security- Firewalls and ID System
System Security- Firewalls and ID SystemSystem Security- Firewalls and ID System
System Security- Firewalls and ID SystemGayathridevi120
 
Certified network defenders
Certified network defendersCertified network defenders
Certified network defenderscraw Security
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdfahmed53254
 
CS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdfCS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdfKakai Catalan
 
Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Jennifer Letterman
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protectionphanleson
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security pptSAIKAT BISWAS
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryrryrsyd
 
Proactive Security That Works
Proactive Security That WorksProactive Security That Works
Proactive Security That WorksBrett L. Scott
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentationKudzai Rerayi
 

Similar to NETWORK SECURITY dibyendu das.pptx (20)

Computer security 7.pptx
Computer security 7.pptxComputer security 7.pptx
Computer security 7.pptx
 
Computing safety
Computing safetyComputing safety
Computing safety
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
What are the Different Types of Endpoint Security Solutions-converted.pdf
What are the Different Types of Endpoint Security Solutions-converted.pdfWhat are the Different Types of Endpoint Security Solutions-converted.pdf
What are the Different Types of Endpoint Security Solutions-converted.pdf
 
System Security- Firewalls and ID System
System Security- Firewalls and ID SystemSystem Security- Firewalls and ID System
System Security- Firewalls and ID System
 
Certified network defenders
Certified network defendersCertified network defenders
Certified network defenders
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
CS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdfCS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdf
 
Module 3.pdf
Module 3.pdfModule 3.pdf
Module 3.pdf
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
 
Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protection
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryr
 
Computer security and
Computer security andComputer security and
Computer security and
 
Proactive Security That Works
Proactive Security That WorksProactive Security That Works
Proactive Security That Works
 
Cyber security
Cyber security Cyber security
Cyber security
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Product brochure-print-spread
Product brochure-print-spreadProduct brochure-print-spread
Product brochure-print-spread
 

Recently uploaded

contact "+971)558539980" to buy abortion pills in Dubai, Abu Dhabi
contact "+971)558539980" to buy abortion pills in Dubai, Abu Dhabicontact "+971)558539980" to buy abortion pills in Dubai, Abu Dhabi
contact "+971)558539980" to buy abortion pills in Dubai, Abu Dhabihyt3577
 
一比一原版查尔斯特大学毕业证如何办理
一比一原版查尔斯特大学毕业证如何办理一比一原版查尔斯特大学毕业证如何办理
一比一原版查尔斯特大学毕业证如何办理hwoudye
 
Foreigner Call Girls in junagadh 8250092165 Call Girls Advance Cash On Deliv...
Foreigner Call Girls in junagadh  8250092165 Call Girls Advance Cash On Deliv...Foreigner Call Girls in junagadh  8250092165 Call Girls Advance Cash On Deliv...
Foreigner Call Girls in junagadh 8250092165 Call Girls Advance Cash On Deliv...Sareena Khatun
 
PRESTAIR MANUFACTURER OF DISPLAY COUNTER
PRESTAIR MANUFACTURER OF DISPLAY COUNTERPRESTAIR MANUFACTURER OF DISPLAY COUNTER
PRESTAIR MANUFACTURER OF DISPLAY COUNTERPRESTAIR SYSTEMS LLP
 
Call girls Service Nadiad / 8250092165 Genuine Call girls with real Photos an...
Call girls Service Nadiad / 8250092165 Genuine Call girls with real Photos an...Call girls Service Nadiad / 8250092165 Genuine Call girls with real Photos an...
Call girls Service Nadiad / 8250092165 Genuine Call girls with real Photos an...Sareena Khatun
 
Call Girls Vanasthalipuram - 8250092165 Our call girls are sure to provide yo...
Call Girls Vanasthalipuram - 8250092165 Our call girls are sure to provide yo...Call Girls Vanasthalipuram - 8250092165 Our call girls are sure to provide yo...
Call Girls Vanasthalipuram - 8250092165 Our call girls are sure to provide yo...kumargunjan9515
 
Call Girls Baruipur - 8250092165 Our call girls are sure to provide you with ...
Call Girls Baruipur - 8250092165 Our call girls are sure to provide you with ...Call Girls Baruipur - 8250092165 Our call girls are sure to provide you with ...
Call Girls Baruipur - 8250092165 Our call girls are sure to provide you with ...Sareena Khatun
 
Call Girls Service Alappuzha 9332606886 HOT & SEXY Models beautiful and char...
Call Girls Service Alappuzha  9332606886 HOT & SEXY Models beautiful and char...Call Girls Service Alappuzha  9332606886 HOT & SEXY Models beautiful and char...
Call Girls Service Alappuzha 9332606886 HOT & SEXY Models beautiful and char...kumargunjan9515
 
independent Call Girls West Sikkim 9332606886 ust Genuine Escort Model Sevice
independent Call Girls West Sikkim  9332606886  ust Genuine Escort Model Seviceindependent Call Girls West Sikkim  9332606886  ust Genuine Escort Model Sevice
independent Call Girls West Sikkim 9332606886 ust Genuine Escort Model SeviceSareena Khatun
 
Call Girls in Sihor - 8250092165 Our call girls are sure to provide you with ...
Call Girls in Sihor - 8250092165 Our call girls are sure to provide you with ...Call Girls in Sihor - 8250092165 Our call girls are sure to provide you with ...
Call Girls in Sihor - 8250092165 Our call girls are sure to provide you with ...Sareena Khatun
 
Call Girls Surat ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Surat ( 8250092165 ) Cheap rates call girls | Get low budgetCall Girls Surat ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Surat ( 8250092165 ) Cheap rates call girls | Get low budgetSareena Khatun
 
Erotic Vadodara Call Girls Service 👉📞 6378878445 👉📞 Just📲 Call Ruhi Call Gir...
Erotic  Vadodara Call Girls Service 👉📞 6378878445 👉📞 Just📲 Call Ruhi Call Gir...Erotic  Vadodara Call Girls Service 👉📞 6378878445 👉📞 Just📲 Call Ruhi Call Gir...
Erotic Vadodara Call Girls Service 👉📞 6378878445 👉📞 Just📲 Call Ruhi Call Gir...vershagrag
 
Arjunganj % (Genuine) Escort Service Lucknow | Book 9548273370 Extreme Naught...
Arjunganj % (Genuine) Escort Service Lucknow | Book 9548273370 Extreme Naught...Arjunganj % (Genuine) Escort Service Lucknow | Book 9548273370 Extreme Naught...
Arjunganj % (Genuine) Escort Service Lucknow | Book 9548273370 Extreme Naught...adilkhan87451
 
Top Call Girls in Tribeniganj 9332606886 High Profile Call Girls You Can G...
Top Call Girls in Tribeniganj   9332606886  High Profile Call Girls You Can G...Top Call Girls in Tribeniganj   9332606886  High Profile Call Girls You Can G...
Top Call Girls in Tribeniganj 9332606886 High Profile Call Girls You Can G...Sareena Khatun
 
Unlimited Short Call Girls in Jamnagar { 9332606886 } VVIP NISHA Call Girls N...
Unlimited Short Call Girls in Jamnagar { 9332606886 } VVIP NISHA Call Girls N...Unlimited Short Call Girls in Jamnagar { 9332606886 } VVIP NISHA Call Girls N...
Unlimited Short Call Girls in Jamnagar { 9332606886 } VVIP NISHA Call Girls N...kumargunjan9515
 
The Codex Alimentarius Commission (CAC).
The Codex Alimentarius Commission (CAC).The Codex Alimentarius Commission (CAC).
The Codex Alimentarius Commission (CAC).Ravikumar Vaniya
 
Call Girls in Rajkot / 8250092165 Genuine Call girls with real Photos and Number
Call Girls in Rajkot / 8250092165 Genuine Call girls with real Photos and NumberCall Girls in Rajkot / 8250092165 Genuine Call girls with real Photos and Number
Call Girls in Rajkot / 8250092165 Genuine Call girls with real Photos and NumberSareena Khatun
 
PRESENTATION.on wooden comb idea innovation project
PRESENTATION.on wooden comb idea innovation projectPRESENTATION.on wooden comb idea innovation project
PRESENTATION.on wooden comb idea innovation projectjain99591
 
Call girls Service Bogmalo ( 8250092165 ) Cheap rates call girls | Get low bu...
Call girls Service Bogmalo ( 8250092165 ) Cheap rates call girls | Get low bu...Call girls Service Bogmalo ( 8250092165 ) Cheap rates call girls | Get low bu...
Call girls Service Bogmalo ( 8250092165 ) Cheap rates call girls | Get low bu...kumargunjan9515
 
Call girls Service Songadh / 8250092165 Genuine Call girls with real Photos a...
Call girls Service Songadh / 8250092165 Genuine Call girls with real Photos a...Call girls Service Songadh / 8250092165 Genuine Call girls with real Photos a...
Call girls Service Songadh / 8250092165 Genuine Call girls with real Photos a...Sareena Khatun
 

Recently uploaded (20)

contact "+971)558539980" to buy abortion pills in Dubai, Abu Dhabi
contact "+971)558539980" to buy abortion pills in Dubai, Abu Dhabicontact "+971)558539980" to buy abortion pills in Dubai, Abu Dhabi
contact "+971)558539980" to buy abortion pills in Dubai, Abu Dhabi
 
一比一原版查尔斯特大学毕业证如何办理
一比一原版查尔斯特大学毕业证如何办理一比一原版查尔斯特大学毕业证如何办理
一比一原版查尔斯特大学毕业证如何办理
 
Foreigner Call Girls in junagadh 8250092165 Call Girls Advance Cash On Deliv...
Foreigner Call Girls in junagadh  8250092165 Call Girls Advance Cash On Deliv...Foreigner Call Girls in junagadh  8250092165 Call Girls Advance Cash On Deliv...
Foreigner Call Girls in junagadh 8250092165 Call Girls Advance Cash On Deliv...
 
PRESTAIR MANUFACTURER OF DISPLAY COUNTER
PRESTAIR MANUFACTURER OF DISPLAY COUNTERPRESTAIR MANUFACTURER OF DISPLAY COUNTER
PRESTAIR MANUFACTURER OF DISPLAY COUNTER
 
Call girls Service Nadiad / 8250092165 Genuine Call girls with real Photos an...
Call girls Service Nadiad / 8250092165 Genuine Call girls with real Photos an...Call girls Service Nadiad / 8250092165 Genuine Call girls with real Photos an...
Call girls Service Nadiad / 8250092165 Genuine Call girls with real Photos an...
 
Call Girls Vanasthalipuram - 8250092165 Our call girls are sure to provide yo...
Call Girls Vanasthalipuram - 8250092165 Our call girls are sure to provide yo...Call Girls Vanasthalipuram - 8250092165 Our call girls are sure to provide yo...
Call Girls Vanasthalipuram - 8250092165 Our call girls are sure to provide yo...
 
Call Girls Baruipur - 8250092165 Our call girls are sure to provide you with ...
Call Girls Baruipur - 8250092165 Our call girls are sure to provide you with ...Call Girls Baruipur - 8250092165 Our call girls are sure to provide you with ...
Call Girls Baruipur - 8250092165 Our call girls are sure to provide you with ...
 
Call Girls Service Alappuzha 9332606886 HOT & SEXY Models beautiful and char...
Call Girls Service Alappuzha  9332606886 HOT & SEXY Models beautiful and char...Call Girls Service Alappuzha  9332606886 HOT & SEXY Models beautiful and char...
Call Girls Service Alappuzha 9332606886 HOT & SEXY Models beautiful and char...
 
independent Call Girls West Sikkim 9332606886 ust Genuine Escort Model Sevice
independent Call Girls West Sikkim  9332606886  ust Genuine Escort Model Seviceindependent Call Girls West Sikkim  9332606886  ust Genuine Escort Model Sevice
independent Call Girls West Sikkim 9332606886 ust Genuine Escort Model Sevice
 
Call Girls in Sihor - 8250092165 Our call girls are sure to provide you with ...
Call Girls in Sihor - 8250092165 Our call girls are sure to provide you with ...Call Girls in Sihor - 8250092165 Our call girls are sure to provide you with ...
Call Girls in Sihor - 8250092165 Our call girls are sure to provide you with ...
 
Call Girls Surat ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Surat ( 8250092165 ) Cheap rates call girls | Get low budgetCall Girls Surat ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Surat ( 8250092165 ) Cheap rates call girls | Get low budget
 
Erotic Vadodara Call Girls Service 👉📞 6378878445 👉📞 Just📲 Call Ruhi Call Gir...
Erotic  Vadodara Call Girls Service 👉📞 6378878445 👉📞 Just📲 Call Ruhi Call Gir...Erotic  Vadodara Call Girls Service 👉📞 6378878445 👉📞 Just📲 Call Ruhi Call Gir...
Erotic Vadodara Call Girls Service 👉📞 6378878445 👉📞 Just📲 Call Ruhi Call Gir...
 
Arjunganj % (Genuine) Escort Service Lucknow | Book 9548273370 Extreme Naught...
Arjunganj % (Genuine) Escort Service Lucknow | Book 9548273370 Extreme Naught...Arjunganj % (Genuine) Escort Service Lucknow | Book 9548273370 Extreme Naught...
Arjunganj % (Genuine) Escort Service Lucknow | Book 9548273370 Extreme Naught...
 
Top Call Girls in Tribeniganj 9332606886 High Profile Call Girls You Can G...
Top Call Girls in Tribeniganj   9332606886  High Profile Call Girls You Can G...Top Call Girls in Tribeniganj   9332606886  High Profile Call Girls You Can G...
Top Call Girls in Tribeniganj 9332606886 High Profile Call Girls You Can G...
 
Unlimited Short Call Girls in Jamnagar { 9332606886 } VVIP NISHA Call Girls N...
Unlimited Short Call Girls in Jamnagar { 9332606886 } VVIP NISHA Call Girls N...Unlimited Short Call Girls in Jamnagar { 9332606886 } VVIP NISHA Call Girls N...
Unlimited Short Call Girls in Jamnagar { 9332606886 } VVIP NISHA Call Girls N...
 
The Codex Alimentarius Commission (CAC).
The Codex Alimentarius Commission (CAC).The Codex Alimentarius Commission (CAC).
The Codex Alimentarius Commission (CAC).
 
Call Girls in Rajkot / 8250092165 Genuine Call girls with real Photos and Number
Call Girls in Rajkot / 8250092165 Genuine Call girls with real Photos and NumberCall Girls in Rajkot / 8250092165 Genuine Call girls with real Photos and Number
Call Girls in Rajkot / 8250092165 Genuine Call girls with real Photos and Number
 
PRESENTATION.on wooden comb idea innovation project
PRESENTATION.on wooden comb idea innovation projectPRESENTATION.on wooden comb idea innovation project
PRESENTATION.on wooden comb idea innovation project
 
Call girls Service Bogmalo ( 8250092165 ) Cheap rates call girls | Get low bu...
Call girls Service Bogmalo ( 8250092165 ) Cheap rates call girls | Get low bu...Call girls Service Bogmalo ( 8250092165 ) Cheap rates call girls | Get low bu...
Call girls Service Bogmalo ( 8250092165 ) Cheap rates call girls | Get low bu...
 
Call girls Service Songadh / 8250092165 Genuine Call girls with real Photos a...
Call girls Service Songadh / 8250092165 Genuine Call girls with real Photos a...Call girls Service Songadh / 8250092165 Genuine Call girls with real Photos a...
Call girls Service Songadh / 8250092165 Genuine Call girls with real Photos a...
 

NETWORK SECURITY dibyendu das.pptx

  • 1. NETWORK SECURITY WHAT IS NETWORK SECURITY? Network security is any activity designed to protect the usability and integrity of your network and data. It includes both hardware and software technologies It targets a variety of threats It stops them from entering or spreading on your network Effective network security manages access to the network
  • 2. BENEFITS OF NETWORK SECURITY  Network Security is vital in protecting client data and information, keeping shared data secure and ensuring reliable access and network performance as well as protection from cyber threats.
  • 3.  TYPES OF NETWORK SECURITY PROTECTIONS  Firewall  Network Segmentation  Remote Access VPN  Zero Trust Network Access (ZTNA)  Email Security  Data Loss Prevention (DLP)  Intrusion Prevention Systems (IPS)  Sandboxing  Hyperscale Network Security  Cloud Network Security  Robust Network Security Will Protect Against
  • 4. FIREWALL  Firewall control incoming and outgoing traffic on networks, with predetermined security rules
  • 5. NETWORK SEGMENTATION  Network segmentation defines boundaries between network segments where assets within the group have a common function, risk or role within an organization.
  • 6. REMOTE ACCESS VPN  Remote access VPN provides remote and secure access to a company network to individual hosts or clients, such as telecommuters, mobile users, and extranet consumers.
  • 7. ZERO TRUST NETWORK ACCESS (ZTNA)  The zero trust security model states that a user should only have the access and permissions that they require to fulfill their role.
  • 8. EMAIL SECURITY Email security refers to any processes, products, and services designed to protect your email accounts and email content safe from external threats
  • 9. DATA LOSS PREVENTION (DLP)  Data loss prevention (DLP) is a cybersecurity methodology that combines technology and best practices to prevent the exposure of sensitive information outside of an organization, especially regulated data such as personally identifiable information (PII) and compliance related data: HIPAA, SOX, PCI DSS, etc.
  • 10. INTRUSION PREVENTION SYSTEMS (IPS)  IPS technologies can detect or prevent network security attacks such as brute force attacks, Denial of Service (DoS) attacks and exploits of known vulnerabilities. A vulnerability is a weakness for instance in a software system and an exploit is an attack that leverages that vulnerability to gain control of that system. When an exploit is announced, there is often a window of opportunity for attackers to exploit that vulnerability before the security patch is applied. An Intrusion Prevention System can be used in these cases to quickly block these attacks.
  • 11. SANDBOXING  Sandboxing is a cybersecurity practice where you run code or open files in a safe, isolated environment on a host machine that mimics end- user operating environments. Sandboxing observes the files or code as they are opened and looks for malicious behavior to prevent threats from getting on the network. For example malware in files such as PDF, Microsoft Word, Excel and PowerPoint can be safely detected and blocked before the files reach an unsuspecting end user.
  • 12. HYPERSCALE NETWORK SECURITY Hyperscale is the ability of an architecture to scale appropriately, as increased demand is added to the system. This solution includes rapid deployment and scaling up or down to meet changes in network security demands. By tightly integrating networking and compute resources in a software-defined system, it is possible to fully utilize all hardware resources available in a clustering solution.
  • 13. CLOUD NETWORK SECURITY Applications and workloads are no longer exclusively hosted on-premises in a local data center. Protecting the modern data center requires greater flexibility and innovation to keep pace with the migration of application workloads to the cloud. Software-defined Networking (SDN) and Software-defined Wide Area Network (SD-WAN) solutions enable network security solutions in private, public, hybrid and cloud-hosted Firewall- as-a-Service (FWaaS) deployments.
  • 14. ROBUST NETWORK SECURITY WILL PROTECT AGAINST Virus Worms Trojan Spyware Adware Ransomware
  • 15. VIRUS A virus is a malicious, downloadable file that can lay dormant that replicates itself by changing other computer programs with its own code. Once it spreads those files are infected and can spread from one computer to another, and/or corrupt or destroy network data.
  • 16. WORMS Can slow down computer networks by eating up bandwidth as well as the slow the efficiency of your computer to process data. A worm is a standalone malware that can propagate and work independently of other files, where a virus needs a host program to spread.
  • 17. TROJAN A trojan is a backdoor program that creates an entryway for malicious users to access the computer system by using what looks like a real program, but quickly turns out to be harmful. A trojan virus can delete files, activate other malware hidden on your computer network, such as a virus and steal valuable data.
  • 18. SPYWARE Much like its name, spyware is a computer virus that gathers information about a person or organization without their express knowledge and may send the information gathered to a third party without the consumer’s consent.
  • 19. ADWARE Can redirect your search requests to advertising websites and collect marketing data about you in the process so that customized advertisements will be displayed based on your search and buying history.
  • 20. RANSOMWARE This is a type of trojan cyberware that is designed to gain money from the person or organization’s computer on which it is installed by encrypting data so that it is unusable, blocking access to the user’s system.