client login | site map | blog

Information Security

Perimeter Security


Perimeter security addresses the security at the edge of the private network - where it connects to the public Internet or other 3rd party network. An access control policy is used to protect an organisation from security threats by specifying what data can enter and leave an organisation's network. Gateway firewalls are used to enforce this policy. Once the only security deployed by many organisations, today firewalls are seen as a building block in an all-encompassing tiered approach to network security.

  • Firewall Technologies.
  • VPN Technologies.
  • Intrusion Detection and Prevention Technologies.
  • Internet Proxy Technologies

Does your organization have access to expertise in all aspects of perimeter security, including networking, firewalls, intrusion detection systems (IDSs), intrusion prevention systems (IPSs), Virtual Private Networks (VPNs) and Internet Proxies? Can you definitively say how secure or insecure your network is? Does everyone in your organization understand the policies related to information security and their implications? One hint that they do not is the famous expression, "But we have a firewall!" If you work in information security, you probably hear this phrase more often than you would like to, because it seems to express the opinion of many people, both technical and non technical.



Perimeter Security

i-net multimedia limited 2004 - 2024 | legal information | privacy policy