Access control security

Best practices for the HP wired infrastructure

Bereitgestellt von: Hewlett-Packard GmbH Division Storage Services / Hewlett-Packard GmbH Division Storage

Factors such as cost, network instability, risk of breach, and ease of implementation all play an equal part in making the right decision to retrofit an insecure albeit functional LAN.

This document will serve to outline the approaches to securing the network that HP knows, and have proven to work, in addition to providing information about what does not work. Getting all of the correct pieces to fit together is not so easy, so the paper we has also provided the necessary configuration specifics to help with securing some of those devices connected to your network that you may have forgotten about such as network printers, VoIP phones, and security cameras.

Dieser Download wird Ihnen von Dritten (z.B. vom Hersteller) oder von unserer Redaktion kostenlos zur Verfügung gestellt. Bei Problemen mit dem Öffnen des Whitepapers deaktivieren Sie bitte den Popup-Blocker für diese Website. Sollten Sie weitere Hilfe benötigen, wenden Sie sich bitte an hilfe@vogel.de.
Publiziert: 01.12.11 | Hewlett-Packard GmbH Division Storage Services / Hewlett-Packard GmbH Division Storage