The following table describes a tiered implementation that you can use as a guideline when designing your own implementation. Note that CA Threat Manager provides complete flexibility and can be scaled up or down by adding or subtracting tiers as necessary to accommodate the layout and organization of your business.
|
Tier |
Typical Location for this Tier |
CA TM Product Component Installed at this Tier |
CA TM Functions Provided at this Tier |
|---|---|---|---|
|
Tier 1
|
Corporate Data Center |
CA Threat Management Administration Server |
|
|
Tier 2
|
Corporate Data Center |
Redistribution Server (1 or more) Policy Proxy Server (1 or more)
|
|
|
Tier 3
|
Corporate Data Center (High Risk machines and Mail Servers) |
Threat Management Agent, plus MS Exchange or Lotus Notes Mail Groupware Option |
|
|
Tier 4
|
Regional Level Division Servers |
Redistribution Server (1 or more) Policy Proxy Server (1 or more)
|
|
|
Tier 5
|
Regional Level Laptops, Desktops, and other servers |
Threat Management Agent |
|