作者:Brien Posey
出版日期:September 22, 2008
出版社:Syngress
页数:466
ISBN:ISBN-10: 159749285X ISBN-13: 978-1597492850
文件格式:PDF
Book Description
Use GFI’s Tools to Search for Vulnerabilities in Your Network!
Product Description
For system administrators and IT security professionals to properlysecure their networks, it is imperative that they utilize tools whichconstantly scan their networks and report back suspicious activityand/or the presence of known security vulnerabilities. These tasks arealso key components for companies who must achieve Payment CardIndustry Data Security Standard (PCI) compliance. GFI Network Securityis a market leader in this security scanning, reporting, and federalcompliance space. Their products are deployed on over 200,000 networksworldwide and they have over 10,000 worldwide re-sellers. The GFIcustomer base is also extremely active and tightly-knit. Their forumshave over 14,000 registered users and there are currently 18,200 topicsunder discussion. These are good indicators of both the size of themarket and users’ need to gain more information on GFI products. Thisbook is the first reference for these system administrators andsecurity professionals specifically covering GFI’s products. The bookis being developed with support of the GFI Engineering team.
GFI LANGuard Network Security Scanner (NSS) combines vulnerabilityscanning and patch management functions into one, powerful tool set. Byanalyzing the operating system and the applications running on anetwork, GFI LANguard NSS identifies potential security issues. It thenalerts system administrators and security professionals to weaknessesbefore a hacker can find them. This allows the IT staff to close anyholes before they are exploited. The GFI PCI Suite is a packagecomprising the core software required for companies to achieve PaymentCard Industry Data Security Standard (PCI) compliance. This suite is acomponent of GFI LANGuard Network Security Scanner (NSS). The GFI PCISuite also features enhanced reporting functionality with reportscreated specifically to help organizations become compliant.
GFI products have received introductory coverage in dozens of ITbooks for system administrators and security professionals. But, thesetools have never received the in-depth, substantive coverage requiredto truly master them. While our book will have a certain amount ofintroductory material, it will be primarily written for intermediate toadvanced users who must push these tools to the limits to do theirjobs. Readers of this book have already scoured the user forums andsmattering of coverage in other books. Now, they’ll finally have thecomprehensive reference they need.
* Use GFI EndPointSecurity to Lock Down Hardware
* Create Protection Policies to Control the Level of Device Access
* Master Advanced Features of GFI: Locking Device Categories,Blacklisting and Whitelisting Devices, Using File Type Restrictions andMore