Problem solve Get help with specific problems with your technologies, process and projects.

Layered access control: Six top defenses that work

Six top strategies and best practices for building layered security in networks.

This presentation by Dr. Joel M. Snyder, Senior Partner at Opus One and Technical Editor for Information Security...

magazine, was given at Information Security Decisions Spring 2005.

From the Internet down to PDAs -- every device that touches or connects to a network is a potential security problem. Successful network security requires attention to detail at every layer, starting from the outside and moving in. In this talk, Dr. Joel M. Snyder, Senior Partner at Opus One and Technical Editor for Information Security magazine, introduces six strategies for building layered security in networks. By moving from a statement of requirements and problems needing to be solved, into definite actions you can take today, these strategies define clear prescriptions to bolster network security.

Snyder not only covers the six top strategies, he also highlights best practices for putting it all together in an enterprise network in the areas of:

  • Authentication and authorization
  • Traffic separation and coarse-grained security
  • Fine-grained security and protocol control
  • Encryption and privacy
  • Intrusion detection and problem remediation
  • Endpoint security awareness and enforcement

View the presentation

Visit our network access control resource center


This was last published in May 2005

Dig Deeper on Network intrusion detection and prevention (IDS-IPS)

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.