Chapter 7. Network Security Platform Options and Best Deployment Practices

This chapter covers the following topics:

Network Security Platform Options

Network Security Device Best Practices

But lo! men have become the tools of their tools. —Henry David Thoreau, “Economy,” Walden, 1854

All of the books in the world contain no more information than is broadcast as video in a single large American city in a single year. Not all bits have equal value. —Carl Sagan

When preparing to deploy security technology, many decisions must be made. Two of the main ones are deciding which kinds of devices should be deployed and where they should be deployed. This chapter covers these two topics in detail. First you will learn the different platforms on which ...

Get Network Security Architectures now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.