Premium Content

Access "Designing a defense-in-depth network security model"

Joel Snyder, Contributor Published: 01 Jun 2003

Remote connectivity, partner extranets, supply chains, on-site consultants, partners and peer-to-peer networks render Bill Cheswick's 1990 network security model of a "crunchy shell around a soft, chewy center" increasingly obsolete. Although inexpensive firewalls are getting smarter and faster, the most significant security issues are on the inside of your network. Picking the players Many vendors offer infrastructure security products, and it was difficult to identify those that matched our enterprise-scale requirements. We invited the major switch, wireless and firewall vendors to participate, including 3Com, Check Point Software Technologies, Cisco Systems, Enterasys Networks, Extreme Networks, F5 Networks, Foundry, Hewlett-Packard, NetScreen Technologies, SonicWALL and WatchGuard. Some declined to participate because of a mismatch between their current product set and our requirements. Others declined because of resource constraints. The stock response to the challenges of the virtual enterprise has been to heap on protection at multiple layers, ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free