ITperfection-admin21

About Ali Hassani

This author has not yet filled in any details.
So far Ali Hassani has created 158 blog entries.

Software Firewalls

2020-09-10T13:35:37+00:00Categories: Anti-malware & Firewalls, Network Security|Tags: , , , , , , , , , , , , , , , , , , |

You know that firewalls exist in both as software and as hardware devices. Each has its advantages and disadvantages. In general, the use of software firewalls for home use, personal use and small businesses is recommended, as well as the use of hardware firewalls for medium and large businesses. To read: All things about firewall [...]

Familiarity with Anti-malwares (Home solutions) – Part II

2020-09-26T06:49:12+00:00Categories: Anti-malware & Firewalls, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

In the previous post, we reviewed the products of five manufacturers. We now intend to review the products of five other companies. See also: Familiarity with Anti-malwares (Home solutions) - Part I     ESET is a Slovak internet security company that offers anti-virus and firewall products. ESET is headquartered in Bratislava, Slovakia, and [...]

Familiarity with Anti-malwares (Home solutions) – Part I

2020-09-09T06:38:33+00:00Categories: Anti-malware & Firewalls, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Another step to secure your personal computer (desktop or laptop) as well as your tablet and mobile phone is to use anti-malware. The anti-malware industry is a relatively old industry, and over the decades many anti-malware manufacturers have become very experienced and powerful. The good news for us end users is that there is very [...]

Cisco ASA Firewalls

2020-09-11T12:51:18+00:00Categories: Anti-malware & Firewalls, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

This post is about Cisco Firewalls. It aggregates available information from datasheets published by Cisco. The ASA in Cisco ASA stands for Adaptive Security Appliance. We suggest that you read the following two posts before continuing to read this post: All Things about Firewall Hardware Firewalls In fact, Cisco ASA is a security device that combines [...]

Network Inventory Tool: LANsweeper

2020-09-02T05:34:57+00:00Categories: Network Administration|Tags: , , , , , , , , , , , , , |

Each network administrator wishes to be able to document the assets related to the computer network in such a way that this documentation always: Be up to date Be reliable Be available This can be done manually: someone examines the assets and records them on a piece of paper or in a spreadsheet file. But [...]

Network Monitoring Tools: Veaam ONE

2020-09-26T09:04:00+00:00Categories: Network Monitoring, Network Security|Tags: , , , , , , , , , |

So far, we have introduced and reviewed several software packages for network monitoring in our posts. In this post, we are going to discuss another powerful software package: Veeam ONE. Veeam ONE, part of Veeam Availability Suite, provides comprehensive monitoring and analytics for your backup, virtual and physical environments. Veeam ONE enables real-time monitoring, business [...]

How to Comply with PCI DSS

2020-09-09T06:59:01+00:00Categories: Network Compliances, Network Security|Tags: , , , , , , , , , , , , , , , , , |

This post presents How to comply with PCI DSS. This article is a summary from of the pcisecuritystandards.org website. With the following link: PCI DSS Quick Reference Guide For more info please refer to pcisecuritystandards.org We recommend you that before continuing, read this post. Each payment card brand maintains its own separate compliance enforcement programs [...]

Security Controls and Processes for PCI DSS Requirements

2020-09-09T07:03:35+00:00Categories: Network Compliances, Network Security|Tags: , , , , , , , , , , , , , |

We already have a post called PCI-DSS that you can read it here. Now, in this post, we are going to get acquainted with the security controls and processes required for a PCI-DSS implementation. This post presents the objectives of PCI DSS and related 12 requirements. This article is a summary from of the pcisecuritystandards.org [...]

VPN

2020-09-02T05:35:40+00:00Categories: Computer & Network Concepts|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , |

A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. In other words, A Virtual Private Network is a connection method used to add security and privacy [...]

Go to Top