PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
June 2003

Designing a defense-in-depth network security model

Remote connectivity, partner extranets, supply chains, on-site consultants, partners and peer-to-peer networks render Bill Cheswick's 1990 network security model of a "crunchy shell around a soft, chewy center" increasingly obsolete. Although inexpensive firewalls are getting smarter and faster, the most significant security issues are on the inside of your network. Picking the players Many vendors offer infrastructure security products, and it was difficult to identify those that matched our enterprise-scale requirements. We invited the major switch, wireless and firewall vendors to participate, including 3Com, Check Point Software Technologies, Cisco Systems, Enterasys Networks, Extreme Networks, F5 Networks, Foundry, Hewlett-Packard, NetScreen Technologies, SonicWALL and WatchGuard. Some declined to participate because of a mismatch between their current product set and our requirements. Others declined because of resource constraints. The stock response to the challenges of the virtual enterprise has been to heap on ...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

Columns in this issue