Threat Management Solution
Source: Trend Micro
This paper provides users with the information necessary to create a plan for deploying the Threat Management Solution to their network environment. More specifically, this paper discusses network topology considerations, network traffic considerations, network growth considerations, and Threat Management Solution component placement. This paper also provides systematic instructions on how to configure each component of the Threat Management Solution so that it can communicate with other solution components. The paper assumes a basic knowledge of networking concepts and security systems, such as antivirus and content security protection, Network concepts, etc.