THESIS
2020
211 pages : color illustrations ; 30 cm
Abstract
Network security solutions which are currently on the market provide companies with either too many options or too many restrictions. Businesses can either implement multiple network security devices to cover different network security features, or they can implement a Unified Threat Management (UTM) device for an all-in-one solution. However, these both pose problems in terms of scalability. Multiple security devices increase the cost, size, complexity and maintenance of a network. Whereas, UTM devices are more rigid, and restrict the expansion of network security due to them being a single device with a pre-set list of features. This study analyses the current methods and trends within the network security industry to create a device the market needs. The results of the analysis have...[
Read more ]
Network security solutions which are currently on the market provide companies with either too many options or too many restrictions. Businesses can either implement multiple network security devices to cover different network security features, or they can implement a Unified Threat Management (UTM) device for an all-in-one solution. However, these both pose problems in terms of scalability. Multiple security devices increase the cost, size, complexity and maintenance of a network. Whereas, UTM devices are more rigid, and restrict the expansion of network security due to them being a single device with a pre-set list of features. This study analyses the current methods and trends within the network security industry to create a device the market needs. The results of the analysis have shown how the network security market can benefit from a scalable network security device. By utilizing modular technology, this study shows how to develop a device which provides companies with flexible yet efficient network security.
This thesis explores the conceptualization & commercialization of a new scalable network security device known as the Asmond One. The device implements four pre-set feature-based modules targeted at different business sizes. This implementation gives businesses flexibility by making it easy for companies to scale their network security up or down.
Post a Comment