10.07.2015 Views

Provider-1/SiteManager-1 - Check Point

Provider-1/SiteManager-1 - Check Point

Provider-1/SiteManager-1 - Check Point

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

FIGURE 1-3Conglomerate’s networkCorporate IT departments must manage security services for a wide-spread system,with link-ups with vendors, external inventory systems, billing inputs, and reportingrequirements. Different branches are geographically distributed and have independentnetwork management. Yet the network security personnel must support acorporate-wide security policy, with rules enforcing access for appropriate users,preventing attacks, enabling secure communication and fail-over capabilities.IT departments must often delegate levels of authority among administrators, so thatthere is a hierarchy of access even within systems support. Whereas some administratorswill have global authorities to maintain the system backbone, others may handlespecialized activities and only require permissions for certain parts of the system. Forexample, an IT support person in a manufacturing branch would not necessarily needto have total administrator privileges for the logistics headquarters network, and avendor administrator that handles network maintenance would not need corporatewidepermissions.Chapter 1 Introduction 13

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!