eBooks/eGuides

Data Center and Hybrid Cloud for Dummies

Issue link: https://insights.oneneck.com/i/1458399

Contents of this Issue

Navigation

Page 49 of 82

CHAPTER 4 Leveraging Unmatched Threat Protection 45 These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. Chapter 4 IN THIS CHAPTER » Revisiting defense in depth » Redefining the security perimeter » Exploring key components of threat protection » Working together to deliver effective threat protection Leveraging Unmatched Threat Protection I n this chapter, you explore the challenges of traditional defense in depth and perimeter-based security best practices, learn the essentials of threat protection, and discover why a broad eco- system of security partners is critical to delivering unmatched threat protection in data centers and hybrid cloud environments. The Challenges of Defense in Depth Defense in depth is a well-understood and long-accepted secu- rity maxim. The basic idea of defense in depth is to deploy mul- tiple security detection and prevention solutions to address a wide array of potential threats. For example, an organization might typically deploy firewalls, intrusion preventions (IPS), and anti- virus software. Over time, a whole litany of new point security solutions ("innovations") from different security vendors were developed and sold, including web content filtering, email secu- rity (anti-spam) gateways, web application firewalls (WAFs), data loss prevention (DLP), distributed denial-of-service (DDoS) defense, network vulnerability scanning, cloud access security brokers (CASB), security information and event management (SIEM), and much more.

Articles in this issue

Archives of this issue

view archives of eBooks/eGuides - Data Center and Hybrid Cloud for Dummies