Properties (56)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:Company
|
gptkbp:canAllocate |
Security Breaches
|
gptkbp:canBe |
Software
Hardware Traffic_Data |
gptkbp:canSupport |
gptkb:Virtual_Private_Networks_(VPNs)
|
gptkbp:engineConfiguration |
Specific Security Policies
|
gptkbp:hasFacility |
Control incoming and outgoing network traffic
|
https://www.w3.org/2000/01/rdf-schema#label |
Firewall Systems
|
gptkbp:integration |
Intrusion_Detection_Systems_(IDS)
Intrusion_Prevention_Systems_(IPS) |
gptkbp:isAttendedBy |
Zero-Day Vulnerabilities
|
gptkbp:isCounteredBy |
Penetration Testing
|
gptkbp:isCriticizedFor |
Business Continuity
Data Protection Regulatory Compliance |
gptkbp:isEvaluatedBy |
Performance Metrics
Security Audits |
gptkbp:isManagedBy |
Network Administrators
Cloud_Management_Platforms Centralized_Management_Tools |
gptkbp:isPartOf |
Network Infrastructure
Cybersecurity Strategy Advanced Persistent Threats (APTs) |
gptkbp:isRegulatedBy |
Compliance Standards
|
gptkbp:isSubjectTo |
Regular Updates
User Training |
gptkbp:isUsedFor |
Access Control
Artificial Intelligence Machine Learning Threat Intelligence Cloud Environments Malware Protection Traffic Shaping On-Premises Environments Security Compliance Remote Work Environments Policy Compliance Content Filtering Data Loss Prevention (DLP) Email Filtering Hybrid Environments Application Layer Filtering Configuration Compliance Bandwidth_Management Mobile_Device_Management_(MDM) URL_Filtering |
gptkbp:isUsedIn |
Corporate Networks
Home_Networks |
gptkbp:mayHave |
Network Segmentation
Stateful Inspection Proxy Services Next-Generation Firewalls Packet_Filtering |
gptkbp:provides |
Protection against unauthorized access
|
gptkbp:uses |
Rules to determine traffic flow
|