Premium Content

Access "Defense-in-Depth: Securing the network from the perimeter to the core"

Issue Overview

Information Security magazine - June 2003

Enterprise networks are no longer a "crunchy shell around a soft, chewy center" and hence network defenses must be deployed inside the perimeter. But are network security vendors capable securing the network from the inside out? Also: Andrew Briney's first-hand account of the CISSP exam; practical strategies for enterprise risk management; off-the-shelf security intelligence.  Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free