Find it here
 

NetworkPolicy

  Print This Page
 Add To Favorites

  
Network Policy Enforcement

Network Policy Enforcement

Network Policy Enforcement

Implement and Enforce Network Policy

The ability to enforce network policies is an important foundation for a secure computing environment. We can provide easy automated policy management and enforcement for files, network access and applications. With little effort and minimal time, we provide an easy and efficient method to enforce access policies throughout the organization.

We can apply and enforce your policies easily, automatically and effectively and provide detailed reporting of policies and network usage reports with drill down.

Definition of Network Policy Enforcement

“Network Policy Enforcement” is the application of some sort of network access control mechanism to control access to a network. The criteria for whether an end system is allowed to access the network are specified in a set of rules or parameters known as a “policy”.

IT Administrators and service providers need an easy and quick method to implement and manage access policies throughout their computing infrastructure and manage network policy enforcement.

The process of policy enforcement consists of three steps:

  1. Examine the system’s “posture” to determine if it is compliant with the policy.
  2. Using a Policy Enforcement Point, make a decision regarding which parts of the network, if any, that the device should be allowed to access.
  3. Allow the device to access the network as decided. Note the access might be limited to remediation – correcting some policy violation.

Features
File Access Policies
Application Access Policies
Total restriction of specific applications
User notification option
Track network usage by computer and applications

Back to Top


www.ezetek.com.au - IT Managed services - Australia and the Pacific        
This website is for sale-  Email