Home > Articles > Operating Systems, Server > Solaris

  • Print
  • + Share This
Like this article? We recommend

Recommendations

Software architects should look at IPsec to provide application-transparent security. As more and more security breaches occur from within the enterprise, IPsec offers valuable encryption that could minimize security risks. IPsec encryption and authentication are standards-based and implemented in multiple operating systems. You can selectively encrypt data flow on a protocol basis (for example, encrypting LDAP, but allowing HTTP).

As mentioned, IPsec handles one part of a total information security system. The proper hardening and minimization of operating systems, the application of security patches, secure coding, and enforcement of corporate security policies all complement IPsec deployments.

  • + Share This
  • 🔖 Save To Your Account