Problem solve Get help with specific problems with your technologies, process and projects.

Layered access control: 6 top defenses that work

Security guru Joel Snyder introduces six strategies for building layered security in networks in this presentation from Information Security Decisions.

Joel Snyder, senior partner with consultancy Opus One and technical editor of Information Security magazine, presented...

this session at Information Security Decisions Fall 2005.


Visit our resource center for more tips and expert advice on network security

View more presentations from some of the industry's foremost security practitioners

Learn more about Information Security Decisions

From the Internet down to PDAs, every device that touches or connects to a network is a potential security problem. Successful network security requires attention to detail at every layer, starting from the outside and moving in. In this talk, Joel introduces six strategies for building layered security in networks. By moving from a statement of requirements and problems needing to be solved, into definite actions you can take today, these strategies define clear prescriptions to bolster network security.

Joel not only covers the top 6 strategies, he also highlights best practices for putting it all together in an enterprise network in the areas of:

  • Authentication and authorization
  • Traffic separation and coarse-grained security
  • Fine-grained security and protocol control
  • Encryption and privacy
  • Intrusion detection and problem remediation
  • End-point security awareness and enforcement

Download the presentation

This was last published in October 2005

Dig Deeper on Network intrusion detection and prevention (IDS-IPS)

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.