pfSense: IDS/IPS traffic pattern analysis can often detect or block attacks such as a denial-of-service attack or a network scan. However, in some cases this is legitimate traffic (such as using cloud infrastructure for load testing or security testing). Does the cloud provider have a documented exception process for allowing legitimate traffic that the IDS/IPS flags as an attack pattern?

Save time, empower your teams and effectively upgrade your processes with access to this practical pfSense Toolkit and guide. Address common challenges with best-practice templates, step-by-step work plans and maturity diagnostics for any pfSense related project. Download the Toolkit and in Three Steps you will be guided from idea to Read more…

pfSense: IDS/IPS traffic pattern analysis can often detect or block attacks such as a denial-of-service attack or a network scan. However, in some cases this is legitimate traffic (such as using cloud infrastructure for load testing or security testing). Does the cloud provider have a documented exception process for allowing legitimate traffic that the IDS/IPS flags as an attack pattern?

Save time, empower your teams and effectively upgrade your processes with access to this practical pfSense Toolkit and guide. Address common challenges with best-practice templates, step-by-step work plans and maturity diagnostics for any pfSense related project. Download the Toolkit and in Three Steps you will be guided from idea to Read more…

pfSense: Can people access the computing equipment used by your department or organizational unit through the internet, through dial-up access, or from network devices outside your department?

Save time, empower your teams and effectively upgrade your processes with access to this practical pfSense Toolkit and guide. Address common challenges with best-practice templates, step-by-step work plans and maturity diagnostics for any pfSense related project. Download the Toolkit and in Three Steps you will be guided from idea to Read more…

pfSense: Can people access the computing equipment used by your department or organizational unit through the internet, through dial-up access, or from network devices outside your department?

Save time, empower your teams and effectively upgrade your processes with access to this practical pfSense Toolkit and guide. Address common challenges with best-practice templates, step-by-step work plans and maturity diagnostics for any pfSense related project. Download the Toolkit and in Three Steps you will be guided from idea to Read more…

pfSense: If we can no longer trust the network (organizational) perimeter to provide sufficient protection and are now reliant on host perimeter security, what is the trust model between hosts?

Save time, empower your teams and effectively upgrade your processes with access to this practical pfSense Toolkit and guide. Address common challenges with best-practice templates, step-by-step work plans and maturity diagnostics for any pfSense related project. Download the Toolkit and in Three Steps you will be guided from idea to Read more…