Tagged articles
5 articles
Page 1 of 1
Huolala Safety Emergency Response Center
Huolala Safety Emergency Response Center
Aug 22, 2022 · Information Security

Can Attack Simulation Strengthen Real‑World Cyber Defense?

Attack simulation, especially endpoint‑focused BAS, greatly aids purple‑team defenses by enabling comprehensive detection rule creation, yet it cannot fully replicate web zero‑day exploits due to regulatory and intelligence constraints, limiting its universality in modern cyber‑security operations.

Cyber DefenseEndpoint SecurityZero-Day
0 likes · 2 min read
Can Attack Simulation Strengthen Real‑World Cyber Defense?
Top Architect
Top Architect
Apr 28, 2022 · Information Security

SSL VPN Technology Overview and Configuration Guide

This article provides a comprehensive overview of SSL VPN technology, covering its encryption principles, limitations of IPSec, virtual gateway functions, web proxy, file sharing, port forwarding, network expansion modes, endpoint security checks, certificate‑based authentication methods, typical application scenarios, and step‑by‑step configuration procedures.

AuthenticationEndpoint SecuritySSL VPN
0 likes · 9 min read
SSL VPN Technology Overview and Configuration Guide
Architecture Digest
Architecture Digest
Apr 23, 2022 · Information Security

SSL VPN Technology Overview and Configuration Guide

This article provides a comprehensive overview of SSL VPN technology, detailing its advantages over IPSec, core functions such as virtual gateways, web proxy, file sharing, port forwarding, network extension, endpoint security, logging, authentication methods, typical application scenarios, and step‑by‑step configuration procedures.

AuthenticationEndpoint SecuritySSL VPN
0 likes · 9 min read
SSL VPN Technology Overview and Configuration Guide
360 Quality & Efficiency
360 Quality & Efficiency
Oct 28, 2016 · Operations

Performance Testing of 360 Endpoint Security Management System with LoadRunner

This report details the performance testing of the 360 Endpoint Security Management System, covering product overview, architecture, tool selection (favoring LoadRunner), test scenarios, script implementation, execution results, resource utilization, and analysis, concluding with insights on testing methodology and optimization.

Endpoint SecurityJMeterLoad Testing
0 likes · 6 min read
Performance Testing of 360 Endpoint Security Management System with LoadRunner