Searching all of TechTarget| 706 results for "dmz"


By Dejan Lukan Manage Aug 13, 2014

Virtual DMZ security in the cloud

Virtual DMZ cloud configurations require specific security tactics. Expert Dejan Lukan looks at the different types of virtual DMZs and how they differ from physical DMZs. Continue Reading


Oct 02, 2012

Where is your Data Migration DMZ?

Johny Morris, author of Practical Data Migration, looks at how changes to procurement practices have created a trap for the unwary to fall into Continue Reading


By Mike Chapple Problem Solve May 15, 2009

How to set up a DMZ

Looking to set up a DMZ? Look no further. In this expert response, Mike Chapple explains the steps to creating a demilitarized zone. Continue Reading


By Greg Shields Problem Solve Feb 08, 2012

Bringing Windows RDS to the web: Designing the DMZ

Remote Desktop Gateway secures Internet access for Remote Desktop Services applications – if you set it up properly. Continue Reading


By Anand Sastry Problem Solve Aug 26, 2011

How to set up SFTP automation for FTP/DMZ transfer

Transferring files from a DMZ to an internal FTP server can be risky. In this expert response, Anand Sastry explains how to use SFTP automation to lock it down. Continue Reading


By Anand Sastry Aug 25, 2011

How to set up a site-to-site VPN to coexist with a DMZ

When setting up a site-to-site VPN, where should the VPN endpoint be in the DMZ? Learn more in this expert response. Continue Reading


By Greg Shields Problem Solve Jul 21, 2011

DMZ setup: Ditching virtual machines for Platform as a Service

Using Platform as a Service to host DMZ workloads brings cloud computing benefits to your DMZ setup. It’s easier to scale and less complex to build. Continue Reading


By Greg Shields Problem Solve Jul 18, 2011

How DMZ design improves VM security in the cloud

With VM hosting in the cloud, your main concern is VM security. But with a solid DMZ design, you can keep VMs properly isolated. Continue Reading


By Greg Shields Problem Solve Jul 05, 2011

DMZ design: Bringing virtualization and security admins together

DMZ design is often a source of conflict between IT admins and security pros. With virtualization, it’s possible to consolidate trust zones in your DMZ setup. Continue Reading


By Eric Siebert Manage Jun 30, 2011

Best practices for connecting virtualization hosts to DMZ networks

DMZ networks can be used to protect virtualization hosts, but best practices must be considered, including combing virtual and physical firewalls and locking down virtual switches. Continue Reading