如需獲得最佳網頁瀏覽體驗,請使用 IE 11 或更高版本、Chrome、Firefox 或 Safari。

On-Demand Webcast: Endpoint Systems Management Anywhere (How to transition to the DMZ)

On-Demand Webcast: Endpoint Systems Management Anywhere (How to transition to the DMZ)
录播
  • 记录日期:Jun. 25, 2020
  • 活动:录播
On-Demand Webcast: Endpoint Systems Management Anywhere (How to transition to the DMZ)

Our Remote Workforce Webcast Series continues with a look at what to consider if you want to place your KACE Systems Management Appliance (SMA) onto a perimeter network — otherwise known as a “demilitarized zone (DMZ)” server. Watch this on-demand episode to learn tips and tricks for configuring the KACE SMA for network perimeter security.

With increased remote traffic, DMZ network security adds a layer of protection between the local area network inside your firewall and the internet, helping to broaden your endpoint management domain. With a perimeter network security in place, endpoints connecting from unsecured locations via the internet can only access resources on the perimeter network. This setup allows you to put some organizational resources and applications onto the perimeter network, leaving other resources secure behind your firewall.

Watch the webcast to learn:

  • The pros and cons of using a DMZ in network security
  • How to manage a perimeter network internally or externally 
  • How to establish communications between appliances and your network 
  • Best practices for locking down the UI to maintain a secure environment 

观看免费网络直播

请稍候……

triangle-down check
进行下载即表示您注册以接收我们发送的营销电子邮件。要选择不再接收,请按照我们隐私政策中描述的步骤进行操作。

reCAPTCHA为此站点提供保护。请查看Google的隐私政策使用条款