UTM
-Unified Threat Management
incorporates the functions of multiple network and security appliances into a single appliance
IDS/IPS
-Intrusion Detection System/Intrusion Protection System
NIDS/NIPS
INE
NAC
SIEM
- Utilities analyze and correlate logs and events from mulitple sources as well as provide real-time alerting features
Switch
-network appliances that connect devices and workstations, servers, and printers together to form a network
Firewall
-Network firewalls are devices that evaluate incoming and outgoing traffic to determine if the traffic should be allowed or denied entry across a network boundary
Wireless Controller
Router
Proxy Servers
-Hardware or software systems that act as connection intermediaries between internal clients and Internet resources
Load Balancers
-Devices or programs that distribute traffic across a group of similar servers known as server farm or pol, in order to increase performance and availability
HSM
MicroSD HSM
-Tiny HSM cards that plug into the microSD ports of smart devices such as android smart phones and tablets.
WAF
Passive Vulnerability Scanners
analyze network traffic in order to non-intrusively discover vulnerabilities with organizational assets
DAM
- monitor the transations and other activity of database services
VPN
IPSec
- Suite of protocols for securing packets that traverse an IP network
SSL/TLS
SSH
RDP
- provides a secure, graphical, remote access connection over a network between computers using TCP port 3389
VNC
- platform-independent graphical desktop sharing protocol that uses the Remote Frame Buffer (RFB) protocol
VDI
- Involves the hosting of a desktop OS within a virtual network environment on a centralized server