IoT Talent Consortium Logo IoT Talent Consortium
This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.
Click anywhere outside to close

Securing the Cell/Area Zone

Explore the defense in depth approach to system security, focusing on tools that can be deployed at the network layer to provide defense within the Cell/Area zone, including:
• Physical Security
• Switch Hardening
• Device Hardening
• Network and Application Authentication and Authorization
• Zone-base Policy Firewall