In this recipe, we talked about some security components. Some examples are:
- Firewalls: Checkpoint (www.checkpoint.com), Juniper SSG series (http://www.juniper.net/us/en/products-services/security/ssg-series/), Cisco ASA series (http://www.cisco.com/en/US/products/ps5708/Products_Sub_Category_Home.html), and many others.
- NAC: In this category, you have, for example, Forescout (http://www.forescout.com/solutions/network-access-control/) and Enterasys (http://www.enterasys.com/company/literature/nac-ds.pdf).
- IDS/IPS: In this category, we have, for example, the Juniper IDP device series (http://www.juniper.net/us/en/products-services/security/idp-series/) and the Checkpoint software blade for the firewall (http://www.checkpoint.com/products/ips-software-blade/).
- WAF: Here we have, for example, Imperva (http://www.imperva.com/products/wsc_web-application-firewall.html) and F5 (http://www.f5.com/glossary/web-application-firewall/). Database firewalls are available, for example, form Oracle (http://www.oracle.com/us/products/database/security/audit-vault-database-firewall/overview/index.html).
- Web and mail filters: Here we have, for example, McAfee (http://www.mcafee.com/au/products/email-and-web-security/index.aspx), Bluecoat (http://www.bluecoat.com/security-policy-enforcement-center), and Websense (http://www.websense.com/content/Home.aspx).