Quantcast
Channel: IT Answers » Vulnerability Assessment & Audit
Viewing all articles
Browse latest Browse all 19

Data vs. perimeter vs. network security

$
0
0

A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about <a href=http://searchwindowssecurity.techtarget.com/originalContent/0,289142,sid45_gci1007026,00.html>deperimeterization</a>. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall. He then offered techniques for keeping data safe in spite of the activity at your perimeter.

I realize you have a variety of options when it comes to choosing a Windows line of defense, but I’m trying to get a sense of how many people actually lock down Windows at the data level. Do you invest most of your protection efforts at the data, perimeter or network level? What measures do you take to keep your Windows data secure even if the perimeter is compromised? Do you have data protection plans or products in place?

Another issue is that networks and applications are often treated as separate entities that never interact. This may be because they have different people maintaining them, unique security policies, etc. Is this the case in your shop?

I’m collecting this information for possible technical tips or a trends article on SearchWindowsSecurity.com.

Thanks for your time and attention. I hope to hear from you soon.

Best regards,
Robyn Lorusso
Editor
SearchWindowsSecurity.com

http://searchwindowssecurity.techtarget.com/


Viewing all articles
Browse latest Browse all 19

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>