Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)

The art of protecting the perimeter has changed dramatically in the past decade . Networking technologies and their underlying protocols have evolved and continue to evolve at an unprecedented pace. This evolution has made many early perimeter security technologies obsolete, or at the very least, limited in value. This is important to consider when choosing an appropriate solution. The following trends have played a pivotal role in the evolution of perimeter security technologies:

It is important to note that firewalls are not the silver bullet that they are sometimes played out to be. They are one piece of a multilayered approach that should be implemented within your organization. Firewalls were originally developed when there was a solid perimeter, and when Internet connectivity within applications was not as ubiquitous as it is today. Today, it is unusual to find a software application that does not have some capability that relies on the Internet. At minimum, most applications have the ability to update themselves when a new version is available.

If you have not yet developed a security policy for your organization, now is the time to start. It will be difficult to decide on acceptable uses for your network without having done so. Your security policy should be based on the operational needs of your business. Ask yourself, what are the core technologies that are required for your business to function? Your security policy should ultimately dictate the applications that are passing through your organization's firewall, and will define your firewall's configuration.

There are a number of things to consider when deciding which firewall technology will ultimately fit your needs. These factors will have a direct impact on your choice of technology:

Категории