A Layered Approach to Securing the Cloud: Defense in Depth
— As enterprise networking technology has evolved, so too has enterprise security. What began simply as setting up a perimeter around the network via fairly basic security tools like firewalls and email gateways, has evolved into adding an array of virtual private networks (VPNs), virtual local area network (VLAN) segmentation, authentication, and intrusion detection systems (IDS)—necessary to handle the consistently growing number of threats to the corporate network. The answer lies in the notion of maintaining a layered approach or “defense in depth” when it comes to enterprise-class security.
Posts on Security, Cloud, DevOps, Citrix, VMware and others. Words and views are my own and do not reflect on my companies views. Disclaimer: some of the links on this site are affiliate links, if you click on them and make a purchase, I make a commission.
Tuesday, September 27, 2011
A Layered Approach to Securing the Cloud: Defense in Depth | Cloud Computing Journal
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment