ABSTRACT
The explosion of the commercial use of the Internet has created specific business and technology
demands for products that could allow organizations to explore the opportunities that arose without
compromising their security. Thousands of internal networks, with a high level of trust for their owners,
have been connected to a public and loosely controlled network; this has opened those organizations to a
series of new security problems.