Common Network Security Options

Often used by organizations to ease remote management and to cut costs, a network server appliance is a typically inexpensive computer that enables Internet access and some business-related activities.

Common Network Security Options

Many of the antivirus and security functions integrated into appliances can also be incorporated into your network via software. Over traditional software solutions, appliances offer many benefits including the following: it’s easier to configure and manage, offers better integrity (it’s harder to get through an appliance compared to a basic computer running security software), and features better overall performance.

When choosing a software solution, you also need to consider additional products and hardware (operating system, server hardware, storage servers) and also provide maintenance, and set-up configuration for the solution including deployment, upgrades and monitoring. The additional hardware requirements and configuration and maintenance costs are reduced or removed with appliances.

In addition to choosing between software-based security and appliances, organizations can also look at what is traditionally called managed (or hosted) security options. Rather than pay out the money to own the appliance or server hardware and software, managed security is a subscription service model, where you essentially pay per service on an ongoing basis.

Managed security is a more popular choice with small to midsized businesses as the bulk of your security requirements are shifted to a third-party, outside of your own company, leaving security concerns to someone else. While that may sound risky, obviously you need to spend some time finding the right vendor with the right options to suite your network security needs.

RECOMMENDED READING:

More Network Appliance Terms From Webopedia

  • 1
  • 2

Based in Nova Scotia, Vangie Beal is has been writing about technology for more than a decade. She is a frequent contributor to EcommerceGuide and managing editor at Webopedia. You can tweet her online @AuroraGG.

This article was originally published on July 28, 2005

Vangie Beal
Vangie Beal
Vangie Beal is a freelance business and technology writer covering Internet technologies and online business since the late '90s.

Related Articles

Geotargeting

Geotargeting is a method of delivering data or content to users based on their geographic locations. Depending on the application or platform, companies can...

RSA

A public-key encryption technology developed by RSA Data Security, Inc. The acronym stands for Rivest, Shamir, and Adelman, the inventors of the technique. The...

Vendor

A vendor is an individual or organization that sells goods or services to another individual or organization through a stable economic supply distribution system...

Attachment

An attachment is a file attached to an email message. Many email systems support sending text files as email. If the attachment is a...

CISM Certification

Organizations often need cybersecurity-certified IT professionals who can design, develop, implement, and manage...

Certified CCSK

To become certified CCSK means that an IT professional has passed examinations for...

National Security Agency (NSA)

The National Security Agency (NSA) is the most important intelligence agency in the...