Multiple firewalls are most commonly used to segregate networks of different sensitivity levels. Universities, for example, commonly use a series of layered firewalls to provide different zones of security for various types of users. A border firewall forms a loose perimeter around the entire network, providing a basic degree of protection to the entire enterprise. Other firewalls then segment off restricted portions of the network...
-- such as data centers, research labs, infrastructure systems and similar devices -- providing an added level of security to protect those systems from other campus users.
The correct firewall architecture for an organization depends upon a number of variables, including the homogeneity of users, the types of sensitive information being handled and the types of systems on the network. For more information on use cases, read my Firewall Architecture Tutorial.
Dig deeper on Network Firewalls, Routers and Switches
Related Q&A from Mike Chapple, Enterprise Compliance
Should companies obtain U.S. security clearance to join the Enhanced Cybersecurity Services program? Mike Chapple offers his perspective.continue reading
Does a Web application security assessment termed 'compliance ready' seem too good to be true? Learn its role in an enterprise compliance program.continue reading
Learn how hiring the right PCI DSS-compliant service providers, especially payment services providers, can reduce your compliance burden.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.