96 Results for:dmz

  • Sort by: 

How to use a jump server to link security zones

By Damon Garn 26 Feb 2024

Jump servers are a perfect example of less is more. By using these slimmed-down boxes, administrators can connect to multiple resources securely. Read More

Securing industrial IoT: Spotlight on DMZ and segmentation

By Sravani Bhattacharjee 29 Sep 2016

The convergence of IT and OT is creating a number of security risks that must be addressed. Are DMZ and segmentation the answer? Read More

How SASE convergence affects organizational silos

By John Cavanaugh 30 Apr 2024

Most enterprises have siloed departments, but SASE's convergence of network and security functions is disrupting those constructs and driving the need for more team communication. Read More

An intro to the IDMZ, the demilitarized zone for ICSes

By Sharon Shea 05 Apr 2023

Setting up an IDMZ -- a demilitarized zone between enterprise and industrial networks -- can prevent operational environments from becoming compromised by IT threats. Read More

Secure DMZ Web server setup advice

By Anand Sastry 02 Jun 2010

Network security expert Anand Sastry describes how to ensure a secure DMZ Web server setup involving network attached storage (NAS). Read More

Should a router be placed between the firewall and DMZ?

By Mike Chapple 21 Aug 2007

Modern firewalls have the ability to serve as a router, negating the need of another device on a network. There are exceptions to this router rule, however. Network security expert Mike Chapple explains. Read More

How do a DMZ and VPN work together?

By Mike Chapple 22 Apr 2007

In this SearchSecurity.com Q&A, network security expert Mike Chapple explains the three distinct network zones in a typical firewall scenario and reveals how the DMZ and VPN, in particular, co-exist. Read More

Should a domain controller be placed within the DMZ?

By Mike Chapple 04 Apr 2008

When creating an Active Directory network, is it necessary to place domain controllers in the DMZ? Network security expert Mike Chapple explains. Read More

Infrastructure security: Remote access DMZ

11 Dec 2006

An excerpt from Chapter 7: Infrastructure security from "How to Cheat at Managing Information Security," by Mark Osborne. Read More

3 ways to retool UC platform security architecture models

By Andrew Froehlich 11 Apr 2022

The security gap created when remote workers use unified communications to collaborate can be erased through tools designed to augment traditional security mechanisms. Read More