Keyword

Network System Security

Best Practice

Reply’s offer for business security

Reply has an integrated, consistent and complete offer to support its Clients in the development of suitable strategies and in the implementation of adequate solutions for the effective management of Business Security & Data Protection.

Best Practice

Auditing, Compliance & Log Management

Security from the "inside" perspective. In the last few years, the main objective of Security Managers has been to protect the Company Assets from external threats. Sophisticated firewalling, prevention and intrusion detection techniques have been used to deploy an effective protection shield. Blue Reply offers a new solution based on IBM Tivoli Compliance Insight Manager [TCIM].

Best Practice

Business Wireless Security Issues: Scenarios and Solutions

The main and mostly widespread protocol for Wireless communications is defined by the 802.11 standard, ratifyed by IEEE in 1997, and imediately extended from 802.11 to /b/g.

Best Practice

Internet Content Filtering, Management & Reporting

A mail/web/ftp content filtering and control system must perform certain activities: