A security consultant is designing an infrastructure security solution for a client company that has provided the following requirements:
• Access to critical web services at the edge must be redundant and highly available.
• Secure access services must be resilient to a proprietary zero-day vulnerability in a single component.
• Automated transition of secure access solutions must be able to be triggered by defined events or manually by security operations staff.
Which of the following solutions BEST meets these requirements?
Steel16
2 weeks agoSteel16
1 week, 5 days agoAnarckii
8 months, 2 weeks agoweaponxcel
10 months, 4 weeks agoCXSSP
11 months, 3 weeks agoJohnxyzzzz
11 months, 3 weeks agoCoolCat22
1 year agoCXSSP
1 year ago