Review: Lockdown Enforcer
There are many approaches one could take to securing the network, with equally many tools available for each aspect of security. However, if undertaken on a blow-by-blow basis, one can unwittingly construct quite a complex arrangement of tools and service, which, in turn, brings complexity to the administration and support of the task itself.