article thumbnail

InfoSec Policies and Standards: Some strategic context for those just diving into this world

CTOvision

Once the information security policy is written to cover the rules, all employees should adhere to it while sending email, accessing VOIP, browsing the Internet, and accessing confidential data in a system. Backup Policy. Firewall Policy. How firewalls are named, configured etc. Firewall Policy. Implement policies.

Policies 268
article thumbnail

Product Review: Paessler PRTG Network Monitor

Galido

Monitoring QoS (Quality of service, for example, to monitor VoIP). Bandwidth monitoring using SNMP, WMI, NetFlow, sFlow, jFlow, packet sniffing. Application monitoring. Web monitoring. Monitoring of virtual servers. SLA monitoring (service level agreement). Environmental monitoring. Monitoring of LAN, WAN, VPN, and distributed sites.

Network 60
article thumbnail

Building Blocks of a Secure Tech Infrastructure: A Chief Product Officer’s Guide

Kitaboo

5 Ways to Establish and Maintain a Secure Tech Infrastructure Define your Goals and Requirements Get an Assessment Done Establish Strong IT Policies Secure Your Network Build a Backup IV. Network – This includes network elements like LAN and WAN along with internet connection, VoIP, switches, routers, and more.