96 Results for:dmz
- Sort by:
How to use a jump server to link security zones
26 Feb 2024Jump servers are a perfect example of less is more. By using these slimmed-down boxes, administrators can connect to multiple resources securely. Read More
Securing industrial IoT: Spotlight on DMZ and segmentation
29 Sep 2016The convergence of IT and OT is creating a number of security risks that must be addressed. Are DMZ and segmentation the answer? Read More
How SASE convergence affects organizational silos
30 Apr 2024Most enterprises have siloed departments, but SASE's convergence of network and security functions is disrupting those constructs and driving the need for more team communication. Read More
An intro to the IDMZ, the demilitarized zone for ICSes
05 Apr 2023Setting up an IDMZ -- a demilitarized zone between enterprise and industrial networks -- can prevent operational environments from becoming compromised by IT threats. Read More
Secure DMZ Web server setup advice
02 Jun 2010Network security expert Anand Sastry describes how to ensure a secure DMZ Web server setup involving network attached storage (NAS). Read More
Should a router be placed between the firewall and DMZ?
21 Aug 2007Modern firewalls have the ability to serve as a router, negating the need of another device on a network. There are exceptions to this router rule, however. Network security expert Mike Chapple explains. Read More
How do a DMZ and VPN work together?
22 Apr 2007In this SearchSecurity.com Q&A, network security expert Mike Chapple explains the three distinct network zones in a typical firewall scenario and reveals how the DMZ and VPN, in particular, co-exist. Read More
Should a domain controller be placed within the DMZ?
04 Apr 2008When creating an Active Directory network, is it necessary to place domain controllers in the DMZ? Network security expert Mike Chapple explains. Read More
Infrastructure security: Remote access DMZ
11 Dec 2006An excerpt from Chapter 7: Infrastructure security from "How to Cheat at Managing Information Security," by Mark Osborne. Read More
3 ways to retool UC platform security architecture models
11 Apr 2022The security gap created when remote workers use unified communications to collaborate can be erased through tools designed to augment traditional security mechanisms. Read More