Perimeter Security Strategy U02a1

Topics: Network management, Access control, Computer network Pages: 12 (2498 words) Published: June 25, 2015

Perimeter Security Strategy
Hal Hagood

Perimeter Security Strategy
With data breaches on the rise, companies must remain vigilant in safeguarding their assets. Failure to stay in front of data threats will inevitably result in breaches, financial losses, and tarnished reputations. This especially true for company such as EverGreen Financial and effective and meaning management is key. For years, companies have focused on perimeter security to thwart the ever-increasing number of data threats. But now, with more than 50 percent of security breaches perpetrated internally, perimeter defenses are no longer sufficient for securing data. “Today, companies need to extend their data infrastructure across business units, partners, suppliers, customers, and a growing mobile workforce. The outsider is now an insider. Because of this, companies must adopt an enterprise data protection strategy in order to effectively protect data from the core to the edge of the enterprise, an end-to-end encryption solution across databases, applications, networks, and endpoint devices. The result is secure data at all times—at rest, in motion, and in use” (ITbusinessedge, 2015). Networks have become more vulnerable because of fundamental shifts in the complexity and proliferation of personal and business applications, user access, and behavior, as well as the new threat landscape, leading organizations to rethink their network security strategy. However, traditional methods like virtual LANs (VLANs), switch access control lists (ACLs), and port-and protocol-based firewalls do not provide the application visibility and user access controls to effectively secure a network segment. Organizations require a network security platform capable of creating relevant network security policies by application, user, and content for every network segment. The objectives of the network perimeter security audit/assurance review are to provide management with an independent assessment relating to the effectiveness of the network perimeter security and its alignment with the IT security architecture and policy and provide management with an evaluation of the IT function’s preparedness in the event of an intrusion. Security Strategy Diagram

Perimeter Security Analysis
There is no single fix for securing your network or perimeter. In the past if someone asked how do you secure your perimeter? The answer would be "A firewall!” that is not a valid answer today. The perimeter is so much more complex than it used to be. Mastery of multiple security techniques is required to defend your network from remote attacks. You cannot just focus on a single OS or security appliance. A proper security posture must be comprised of multiple layers. This course was developed to give you the knowledge and tools necessary at every layer to ensure your network is secure. The only way to understand if a network traffic control device is going to meet your requirements is to understand the technology underneath the hood. Do all firewalls handle traffic the same way? What is the difference in solutions? “Network perimeter protection practices have not changed significantly in the last decade. Most perimeters rely for protection on stateful inspection firewalls with “holes” liberally poked through them, backed up by noisy and largely ignored intrusion prevention or detection systems. Although perimeter protections have not changed, business and collaboration requirements have driven the use of Internet applications and inter-organization connectivity skyward. These services, located in the demilitarized zone at the perimeter, often traverse the network perimeter with little to no oversight or control. Regulatory compliance has mandated many IT teams “bolt on” certain controls such as data loss prevention and encryption. From “encrypt everything” strategies to “check box” implementations of these...

References: Cisco, (2015). Retrieved April 21 2015 from
Cisco, (2015)
Cisco, (2015). Retrieved April 21, 2015 from
ITBusinessEdge, (2015). Retrieved April 21, 2015 from
Mcafee, (2015), Retrieved April 21, 2015 from
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Perimeter Defense Strategies Essay
  • Strategy Essay
  • Project Part 1: Security Domains and Strategies Essay
  • Essay about security
  • National Security Strategy Essay
  • Essay about Porsche Strategy
  • Security Domains and Strategies Essay
  • National Security Strategy Essay

Become a StudyMode Member

Sign Up - It's Free