Watch the video, listen to the podcast, read the tech tip then take the quiz to see how much you have learned about securing the network perimeter. Passing the quiz earns you one CPE credit from (ISC)2.
Take the quiz to check your knowledge of an effective layered defense.
View our Security School Course Catalog to view more lessons eligible for CPE credits.
In this part:
The concept of defense in depth has evolved considerably from its origins in military strategy. Ten years ago it was a network-centric paradigm, but in today’s perimeterless enterprise environments where a myriad of mobile devices, applications and unique business requirements demand data and services that are available anywhere and anytime, a new take on defense in depth is needed to keep enterprise assets secure.
This video will offer an executive overview of not only the key business and technical issues that have necessitated a dramatic change in defense in depth design, but also how to develop a strategy that can be used to drive an organization’s layered defense tactics amid a threat landscape that has evolved rapidly in the last 1-2 years.
Expert Mike Chapple explores what features a contemporary UTM device provides, and explains the factors that help determine UTM total cost of ownership
Podcast: Fact or fiction – Exfoliating for Layered Defense Success
Many enterprises operate an “accidental” layered defense: rather than thinking holistically about their security architectures, they buy point products over time to triage specific problems, not understanding that successful defense in depth demands complementary technologies that work in unison. This podcast will offers operational suggestions to help an organization identify gaps its defense in depth posture and when to consider new technology or tactics to fill those gaps.