Email Alerts
-
NAC security guide: How to achieve secure network access in the enterprise
This multi-part network access control (NAC) security guide covers a variety of NAC-related topics, offering tips and expert advice on how to thoroughly secure network access to the enterprise. Learning Guide
-
Secure network architecture best practices: DMZ and VLAN security
This mini learning guide will cover best practices for achieving and maintaining a secure network architecture, discussing several aspects of DMZ security and VLAN security. Tutorial
-
Endpoint protection best practices manual: Combating issues, problems
Learn how to employ effective endpoint security controls, technologies and policies, and well as define methods and techniques for a multilayered endpoint defense system. Learning Guide
-
Infrastructure security: Remote access DMZ
An excerpt from Chapter 7: Infrastructure security from "How to Cheat at Managing Information Security," by Mark Osborne. Book Chapter
-
Life at the edge part 2: Divide and conquer with DMZs
Learn how a DMZ works and how it can protect Web servers. SearchSecurity Technical
-
Lesson/Domain 5 -- Security School: Training for CISSP Certification
Security School webcasts are focused on CISSP training. This lesson corresponds to the telecommunications and networking domain in the CISSP exam's "Common Body of Knowledge." School
-
Infosec Know IT All Trivia: Demilitarized zones
Find out how much you know about DMZs with this Trivia Tip. Quiz
-
Quiz: Securing your network
Test your knowledge of network security. Quiz
-
IT security pros acknowledge network security weaknesses, configuration issues
Improperly configured network devices and the inability to measure the network security posture make most IT organizations incapable of finding gaps in their systems, according to a new survey. News | 13 Oct 2011
-
Black Hat: Poor SCADA systems security 'like a ticking time bomb'
An analysis of 120 security assessments at power plants, oil and chemical refineries and other critical systems revealed tens of thousands of security vulnerabilities, outdated operating systems and unauthorized applications. Article | 29 Jul 2010
-
Microsoft NAP-TNC compatibility won't speed adoption, users say
Users hail the new compatibility of Microsoft NAP and the Trusted Computing Group's TNC architecture. But they say it won't speed up their adoption timetables. Article | 21 May 2007
-
Quick Takes: Vendors secure borders on e-mail gateways
Sybari and Authentica kick off this week's edition of Quick Takes with new e-mail security software. Also included are items from Check Point and Nokia, and Wavelink. Article | 08 Oct 2002
-
How to connect virtual environments to DMZ network architecture
Connecting virtualized environments to DMZ network architecture creates new challenges. Network managers must learn new design methodologies to protect virtual traffic in the DMZ. Tip
-
Designing a DMZ using iptables
In this tip, excerpted from ITKnowledge Exchange, security practitioners share strategies used to design a demilitarized zone using iptables. Tip
-
Firewall Architecture Tutorial
In this Firewall Architecture Tutorial you will learn all aspects of firewall implementation such as how to choose the right type of firewall for your organization, how to choose a firewall topology and how to audit firewall activity. Tip
-
Placing systems in a firewall topology
In this Firewall Architecture Tutorial tip, you will learn a firewall topology for placing firewall systems, such as bastion host, screened subnet and multi-homed firewalls. Tip
-
Choosing the right firewall topology: Bastion host, screened subnet or dual firewalls
An overview of the three most common firewall topologies, including diagrams of a bastion host, screened subnet and dual firewall architectures. Tip
-
Auditing firewall activity
This Firewall Architecture Tutorial tip shows how completing a firewall audit of activity can help in the management of valuable firewall data. Tip
-
Perimeter security explored: Firewalls
The foundation of your perimeter security should be firewalls. Tip
-
Making HP JetDirect print servers secure on the network
Here are tips for securing an HP JetDirect print server on a network. Tip
-
The value of a virtual security gateway in the data center
Matthew Pascucci discusses virtual security gateway appliances and whether they are a virtual data center necessity or just an overhyped product. Answer
-
The fundamentals of designing a secure network
When designing a secure network segmentation, monitoring, logging and encryption should be a priority. Matt Pascucci explains in this expert Q&A. Answer
-
How to set up SFTP automation for FTP/DMZ transfer
Transferring files from a DMZ to an internal FTP server can be risky. In this expert response, Anand Sastry explains how to use SFTP automation to lock it down. Answer
-
How to set up a site-to-site VPN to coexist with a DMZ
When setting up a site-to-site VPN, where should the VPN endpoint be in the DMZ? Learn more in this expert response. Answer
-
Secure DMZ Web server setup advice
Network security expert Anand Sastry describes how to ensure a secure DMZ Web server setup involving network attached storage (NAS). Ask the Expert
-
How to set up a DMZ
Looking to set up a DMZ? Look no further. In this expert response, Mike Chapple explains the steps to creating a demilitarized zone. Ask the Expert
-
How to configure firewall ports for webmail system implementation
Network security expert Mike Chapple explains why he always recommends placing any server accessible from the Internet into the DMZ. Ask the Expert
-
When should a database application be placed in a DMZ?
Mike Chapple explains the best network location for an important database application. Chapple also reveals the appropriate level of access to grant remote users. Ask the Expert
-
What low-budget methods can identify network attacks proactively?
Instead of using a honeypot, Mike Chapple has a better recommendation for weeding out malicious traffic that could jeopardize your enterprise network. Answer
-
How will many firewalls serving as the default gateway affect the DMZ?
If you attempt to have multiple firewalls connected to the same network segment, all serving as the default gateway, routing problems will ensue. Network security expert Mike Chapple explains. Ask the Expert
- See more Expert Advice on DMZ Setup and Configuration
-
DMZ (demilitarized zone)
In computer networks, a DMZ (demilitarized zone) is a computer host or small network inserted as a "neutral zone" between a company's private network and the outside public network. It prevents outside users from getting direct access to a server tha... Definition
-
The value of a virtual security gateway in the data center
Matthew Pascucci discusses virtual security gateway appliances and whether they are a virtual data center necessity or just an overhyped product. Answer
-
The fundamentals of designing a secure network
When designing a secure network segmentation, monitoring, logging and encryption should be a priority. Matt Pascucci explains in this expert Q&A. Answer
-
NAC security guide: How to achieve secure network access in the enterprise
This multi-part network access control (NAC) security guide covers a variety of NAC-related topics, offering tips and expert advice on how to thoroughly secure network access to the enterprise. Learning Guide
-
Secure network architecture best practices: DMZ and VLAN security
This mini learning guide will cover best practices for achieving and maintaining a secure network architecture, discussing several aspects of DMZ security and VLAN security. Tutorial
-
IT security pros acknowledge network security weaknesses, configuration issues
Improperly configured network devices and the inability to measure the network security posture make most IT organizations incapable of finding gaps in their systems, according to a new survey. News
-
How to set up SFTP automation for FTP/DMZ transfer
Transferring files from a DMZ to an internal FTP server can be risky. In this expert response, Anand Sastry explains how to use SFTP automation to lock it down. Answer
-
How to set up a site-to-site VPN to coexist with a DMZ
When setting up a site-to-site VPN, where should the VPN endpoint be in the DMZ? Learn more in this expert response. Answer
-
How to connect virtual environments to DMZ network architecture
Connecting virtualized environments to DMZ network architecture creates new challenges. Network managers must learn new design methodologies to protect virtual traffic in the DMZ. Tip
-
Black Hat: Poor SCADA systems security 'like a ticking time bomb'
An analysis of 120 security assessments at power plants, oil and chemical refineries and other critical systems revealed tens of thousands of security vulnerabilities, outdated operating systems and unauthorized applications. Article
-
Secure DMZ Web server setup advice
Network security expert Anand Sastry describes how to ensure a secure DMZ Web server setup involving network attached storage (NAS). Ask the Expert
- See more All on DMZ Setup and Configuration
About DMZ Setup and Configuration
Learn how a demilitarizled zone (DMZ) can increase your network's security by providing a buffer zone between network and Internet traffic. These resources help you design and configure a DMZ to prevent threats, attacks and unwanted external access.
Security Management Strategies for the CIO