Defense in Depth 2.0

Defense in Depth 2.0

Defense in Depth 2.0

Date: Apr 22, 2011

The concept of defense in depth has evolved considerably from its origins in military strategy. Ten years ago it was a network-centric paradigm, but in today’s perimeterless enterprise environments where a myriad of mobile devices, applications and unique business requirements demand data and services that are available anywhere and anytime, a new take on defense in depth is needed to keep enterprise assets secure.

This video will offer an executive overview of not only the key business and technical issues that have necessitated a dramatic change in defense in depth design, but also how to develop a strategy that can be used to drive an organization’s layered defense tactics amid a threat landscape that has evolved rapidly in the last 1-2 years. 

Specific points of emphasis will include:

·         Designing an approach that balances security and functionality

·         Extending defenses to mobile users

·         Exploring various ways to secure your data

·         Incorporating emerging technologies into your strategy

·         Understanding how critical technologies work in concert effectively

·         Keeping your defenses within your budget

More on Network Security: Tools, Products, Software

  • canderson

    Next-generation firewall products: Ready or not, here they come

    VIDEO - Video: David Strom explains how to succeed with next-gen firewall products and avoid problems caused by bad documentation and conflicting products.
  • security information and event management (SIEM)

    Definition - Security information and event management (SIEM) is an approach to security management that seeks to provide a holistic view of organization’s information technology (IT) security. 
  • We honor the winners of Information Security Readers' Choice 2014

    Opinion - More than 1,700 voters weighed in and helped us award this year's top security technologies in 22 categories.
  • McAfee security products to gain integrated threat intelligence feeds

    News - Customers and partners like the new effort by the Intel-owned security vendor to integrate threat intelligence feeds with all of its existing products, but analysts are leery of lacking threat intelligence standards.

    ( Oct 29, 2014 )

  • Yahoo CISO: Enterprise security companies letting us down

    News - At Black Hat 2014, Yahoo CISO Alex Stamos decried enterprise security companies' inability to handle scale and system diversity, and called on vendors to seize the opportunity for innovation.

    ( Aug 08, 2014 )

  • air gapping

    Definition - Air gapping is a security measure that involves removing a computer or network from any externally connected network physically and also ensuring there is also no wireless connection. The NSA TEMPEST project provides recommendations for air-gapping security measures. For a system with extremely sensitive data, a Faraday cage can be used to prevent electromagnetic radiation (EMR) escaping from the air-gapped equipment.

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: