Application and Analysis on Real-Time Protection for Educational Network Based on New UTM Technologies

Article Preview

Abstract:

This paper firstly analyzed the complicated educational network security conditions, especially its’ real-time protection problems; then introduced principle of UTM (United Threat Management) ,and applied the new UTM technology ---Multi-Core UTM in a BIGC’s LAN, at last made a related analysis of this project.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

570-576

Citation:

Online since:

November 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Charles J. Kolodgy, Worldwide Threat Management Security Appliances 2005-2009 Forecast and 2004 Vendor Shares: Security Appliances Remain a Well-Oiled Machine, [EB/OL], http: /www. fortinet. com/news/IDC/33997. htm, (2010-6-10).

Google Scholar

[2] Jacob Chen, A New Approach to Network Protection Ken Xie, , [EB/OL] www. clusit. it/pres/060621chiccarelli. pdf, (2009-7-15).

Google Scholar

[3] Mick Jackson Sensors Network, Building a high-performance United Threat Managements application, [EB/OL], www. sensorynetworks. com/cached_media/nett0529. pdf (2010-5-15).

Google Scholar

[4] Jens Andreessen. Development Trends for UTM". INFORMATION SECURITY AND COMMUNICATIONS PRIVACY, [J], 2008 (9), p.35.

Google Scholar

[5] LiuBin, New Trend of UTM Network Secarity and Protection, SCIENCE MOSAIC [J], 2007 (11) , pp.118-120.

Google Scholar

[6] Extensible Threat Management (XTM) Appliances, [EB/OL], http: /www. watchguard. com/products/xtm-main. asp.

Google Scholar