You have been asked to design a layered security solution for protecting your organization's net-work infrastructure. You research several options and decide to deploy a network-level security con-trol appliance, inline, where traffic is intercepted and analyzed prior to being forwarded to its final destination, such as an application server. Which of the following is NOT considered an inline threat protection technology?
mvsnogueira
Highly Voted 2 years, 6 months agoalbert_kuo
Most Recent 10 months, 1 week ago