Searching all of TechTarget| 703 results for "dmz"

SearchCloudSecurity

By Dejan Lukan Manage Aug 13, 2014

Virtual DMZ security in the cloud

Virtual DMZ cloud configurations require specific security tactics. Expert Dejan Lukan looks at the different types of virtual DMZs and how they differ from physical DMZs. Continue Reading

ComputerWeekly

Oct 02, 2012

Where is your Data Migration DMZ?

Johny Morris, author of Practical Data Migration, looks at how changes to procurement practices have created a trap for the unwary to fall into Continue Reading

SearchSecurity

By Mike Chapple Problem Solve May 15, 2009

How to set up a DMZ

Looking to set up a DMZ? Look no further. In this expert response, Mike Chapple explains the steps to creating a demilitarized zone. Continue Reading

SearchWindowsServer

By Greg Shields Problem Solve Feb 08, 2012

Bringing Windows RDS to the web: Designing the DMZ

Remote Desktop Gateway secures Internet access for Remote Desktop Services applications – if you set it up properly. Continue Reading

SearchSecurity

By Anand Sastry Problem Solve Aug 26, 2011

How to set up SFTP automation for FTP/DMZ transfer

Transferring files from a DMZ to an internal FTP server can be risky. In this expert response, Anand Sastry explains how to use SFTP automation to lock it down. Continue Reading

SearchSecurity

By Anand Sastry Aug 25, 2011

How to set up a site-to-site VPN to coexist with a DMZ

When setting up a site-to-site VPN, where should the VPN endpoint be in the DMZ? Learn more in this expert response. Continue Reading

SearchServerVirtualization

By Greg Shields Problem Solve Jul 21, 2011

DMZ setup: Ditching virtual machines for Platform as a Service

Using Platform as a Service to host DMZ workloads brings cloud computing benefits to your DMZ setup. It’s easier to scale and less complex to build. Continue Reading

SearchServerVirtualization

By Greg Shields Problem Solve Jul 18, 2011

How DMZ design improves VM security in the cloud

With VM hosting in the cloud, your main concern is VM security. But with a solid DMZ design, you can keep VMs properly isolated. Continue Reading

SearchServerVirtualization

By Greg Shields Problem Solve Jul 05, 2011

DMZ design: Bringing virtualization and security admins together

DMZ design is often a source of conflict between IT admins and security pros. With virtualization, it’s possible to consolidate trust zones in your DMZ setup. Continue Reading

SearchNetworking

By Eric Siebert Problem Solve Jun 30, 2011

How to connect virtual environments to DMZ network architecture

Connecting virtualized environments to DMZ network architecture creates new challenges. Network managers must learn new design methodologies to protect virtual traffic in the DMZ. Continue Reading