User’s Guide for Choosing a Security Gateway
Security is no longer simply an infrastructure concern, it has moved “up the stack” into the application and data layer. Increasingly, the reality of delivering security architecture that will both satisfy auditors and stop attacks, means systems must be integrated to applications, web services, and identity management systems.
The paper is an analysis of security gateway technology for enterprise cloud computing has several areas of focus:
• Common enterprise use cases that can benefit from using a security gateway architecture.
• Types of security capabilities that an enterprise can leverage in a security gateway model.
• Deployment, cost and complexity tradeoffs.
• Checklist of concerns for prospective buyers.
The paper considers architecture capabilities, common deployment, and helps identify best options for business requirements, costs, and complexity.
Read the full User’s Guide for Choosing a Security Gateway White Paper.