On the other hand, when securing a customer network it would be an administrative nightmare to accept all possible services that users may use. This strategy provides good control over the traffic and reduces the possibility of a breach because of service misconfiguration.
0 Comments
Leave a Reply. |