Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Beyond the Page: Network security at the edge

The network perimeter is changing; approaches to network perimeter security must adapt. Here's how to cope with the new security environment.

Network security at many organizations has moved beyond "four walls." The traditional methods that used signature-based security technologies to lock down network perimeters to protect against threats from Internet connectivity and malicious traffic are no longer enough. The question for many enterprises now is what constitutes secure perimeter design in modern work environments? This Beyond the Page looks at enterprise strategies for network perimeter security and next-generation tools such as network access control, single sign-on, encryption certificates and more. Is the concept of the network perimeter dead or is it being redefined? Veteran technology journalist David Strom explores the issue from the outside in, including four ways to protect today's perimeter and six means to improve internal policy regarding personally owned devices.

Feature

Network security in the cloud and mobile era

Technological advances have forever broken the boundaries of the network perimeter, and security professionals have responded with new network-edge protection strategies. Strom examines four concrete ways today's infosec pros are protecting these "new" perimeters, approaches that range from a focus on the applications layer to single sign-on integration and encryption. The network edge is becoming ever more fluid, thanks to advanced attack methods and modern mobile technology; learn how the security pros interviewed in this article are coping with the situation.

Tech tip

Six ways to improve your BYOD policy

You can greatly improve security of your network by implementing a strong bring your own device policy. To create a BYOD policy that's effective requires a combination of securing physical devices, tightening up the user login process, securing the applications on personal devices, and controlling network access granted to the devices. Sometimes accomplishing all this takes more than just one security product. In this tip, Strom reviews policy-driven security controls and outlines the key questions security managers should ask vendors when evaluating their tools.

Video

Protecting the network's perimeter must begin with recognizing how it's changed. No longer are firewalls and intrusion prevention tools sufficient. With more sophisticated attacks, and the weaknesses of current defenses, the bottom line is that threats are getting tougher to detect and protect against. 

In this video, Strom looks at the nature of the modern network perimeter and reviews four strategies that IT and security managers can use to defend the new network edge: protecting the applications layer, using encryption certificates, integrating single sign-on technologies and building Web front ends to legacy applications. He also reports on some of the security products that underlie these strategies.

About the author:
David Strom is a freelance writer and professional speaker based in St. Louis. He is former editor in chief of TomsHardware.com, Network Computingmagazine and DigitalLanding.com. Read more from Strom at
Strominator.com.

 

Next Steps

Read the full May edition of Information Security magazine

This was last published in May 2015

Dig Deeper on Secure remote access

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close