6

OC12mon
Defense-in-Depth Needed for Security Management

    End-host defense mechanisms (e.g. host firewalls, application wrappers)

    Ubiquitous network monitoring at aggregation points (e.g. DMZ's and up-stream ISP's)
    • dynamic filtering and data collection
    • security policy compliance monitoring
    • security policy enforcement

    Investigative tools and evidence collection needed for high-performance network links.