I
I
intelliarts2017-12-22 16:05:29
Encryption
intelliarts, 2017-12-22 16:05:29

Hardware traffic encryption and cryptographic protection of computers?

The law says that for our work we need to implement the following:
1) the presence of a secure data transmission channel with traffic encryption using hardware boundary routers;
2) the presence of a system for detecting (preventing) attacks from the Internet into the organization's computer network using a firewall;
3) availability of a cryptographic protection system for computers using crypto keys and user identification systems;
4) the presence of a hardware network analyzer of traffic by the identifier of access control to the carrier of network cards of users;
5) availability of a backup system - libraries on external media.
How to implement this to a minimum, what hardware would you recommend?

Answer the question

In order to leave comments, you need to log in

2 answer(s)
C
cssman, 2017-12-22
@intelliarts

Wangyu that you legally need guest encryption. to do this, google for the word skzy and contact the presale of the vendor you like

C
CityCat4, 2017-12-22
@CityCat4

This is not just a question, but a whole draft of technical specifications that you need to apply to offices that sell related equipment. Because, as SyavaSyava quite rightly noted , perhaps the main thing for you is not the pieces of iron themselves, but the availability of the necessary certificates, because without a piece of paper you are a cockroach.

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question