Firewall and Boundary Auditing

This document describes several simple strategies to leverage multiple Nessus scanners or multiple Passive Vulnerability Scanners with Tenable SecurityCenter to automate boundary auditing. It also describes several tradeoffs to perform audits of multiple Internet and Intranet boundaries that are secured with firewalls, routers, intrusion prevention systems and other types of network policy enforcement devices.

Please register below for your free download of this whitepaper.

*indicates required field