Event Details
Our Remote Workforce Webcast Series continues with a look at what to consider if you want to place your KACE Systems Management Appliance (SMA) onto a perimeter network — otherwise known as a “demilitarized zone (DMZ)” server. Watch this on-demand episode to learn tips and tricks for configuring the KACE SMA for network perimeter security.
With increased remote traffic, DMZ network security adds a layer of protection between the local area network inside your firewall and the internet, helping to broaden your endpoint management domain. With a perimeter network security in place, endpoints connecting from unsecured locations via the internet can only access resources on the perimeter network. This setup allows you to put some organizational resources and applications onto the perimeter network, leaving other resources secure behind your firewall.
Watch the webcast to learn:
Event Details
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.
reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.