When it comes to security architecture, choosing a system that’s scalable and applicable to a broad set of security needs is a wise move. New security services for Internet protocol (IP) networks are emerging that enable new levels of scalability and manageability—while remaining completely transparent to the network. By applying this type of system, you build an optimal framework for future security applications.
out to the end point due to their inherent complexity and lack of scalability. CipherEngine uses Security Groups A cornerstone of the CipherEngine architecture is the use of security groups. The following diagram depicts a network design that has two groups defined. These groups may be structured based on functional boundaries such as HR, Finance and Engineering or by specific location – Dallas, New York, etc. A PEP can be part of one or multiple groups. By grouping secure endpoints together, global