Defense in Depth 2.0

Defense in Depth 2.0

Date: Apr 22, 2011

The concept of defense in depth has evolved considerably from its origins in military strategy. Ten years ago it was a network-centric paradigm, but in today’s perimeterless enterprise environments where a myriad of mobile devices, applications and unique business requirements demand data and services that are available anywhere and anytime, a new take on defense in depth is needed to keep enterprise assets secure.

This video will offer an executive overview of not only the key business and technical issues that have necessitated a dramatic change in defense in depth design, but also how to develop a strategy that can be used to drive an organization’s layered defense tactics amid a threat landscape that has evolved rapidly in the last 1-2 years. 

Specific points of emphasis will include:

·         Designing an approach that balances security and functionality

·         Extending defenses to mobile users

·         Exploring various ways to secure your data

·         Incorporating emerging technologies into your strategy

·         Understanding how critical technologies work in concert effectively

·         Keeping your defenses within your budget

More on Network Security: Tools, Products, Software

  • canderson

    Next-generation firewall products: Ready or not, here they come

    VIDEO - Video: David Strom explains how to succeed with next-gen firewall products and avoid problems caused by bad documentation and conflicting products.
  • Yahoo CISO: Enterprise security companies letting us down

    News - At Black Hat 2014, Yahoo CISO Alex Stamos decried enterprise security companies' inability to handle scale and system diversity, and called on vendors to seize the opportunity for innovation.

    ( Aug 08, 2014 )

  • air gapping

    Definition - Air gapping is a security measure that involves removing a computer or network from any externally connected network physically and also ensuring there is also no wireless connection. The NSA TEMPEST project provides recommendations for air-gapping security measures. For a system with extremely sensitive data, a Faraday cage can be used to prevent electromagnetic radiation (EMR) escaping from the air-gapped equipment.
  • Set up firewalls for the next generation: What to consider

    Tip - Considering a next-generation firewall? The latest features will facilitate design and architecture changes in your data center environment.
  • Deploying network security devices: Tips to avoid failed deployments

    Tip - John Burke offers advice on effectively deploying network security devices to protect sensitive data and manage the mobility boom in the enterprise.
  • Evaluating network security virtualization products

    Tip - Don't risk making mistakes when you evaluate network security virtualization products. Our six key points will keep you on track.

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: