Answer the question
In order to leave comments, you need to log in
Hardware traffic encryption and cryptographic protection of computers?
The law says that for our work we need to implement the following:
1) the presence of a secure data transmission channel with traffic encryption using hardware boundary routers;
2) the presence of a system for detecting (preventing) attacks from the Internet into the organization's computer network using a firewall;
3) availability of a cryptographic protection system for computers using crypto keys and user identification systems;
4) the presence of a hardware network analyzer of traffic by the identifier of access control to the carrier of network cards of users;
5) availability of a backup system - libraries on external media.
How to implement this to a minimum, what hardware would you recommend?
Answer the question
In order to leave comments, you need to log in
Wangyu that you legally need guest encryption. to do this, google for the word skzy and contact the presale of the vendor you like
This is not just a question, but a whole draft of technical specifications that you need to apply to offices that sell related equipment. Because, as SyavaSyava quite rightly noted , perhaps the main thing for you is not the pieces of iron themselves, but the availability of the necessary certificates, because without a piece of paper you are a cockroach.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question