New Security Survival Guide: How To Layer A Solid Defense

John Moore Avatar

Updated on:

A New Look at Layers
While emerging classes of tools may fend off attacks at multiple layers of a security strategy, there are pitfalls if the tools are not properly configured, managed or integrated with existing systems.

Layer 1: Perimeter Security
Layer 2: Host Security
Layer 3: Identity and Access Management
Layer 4: Network Access Control
Layer 5: Vulnerability Management
Layer Integration: Pulling It All Together

QUESTION: What do you think is the biggest pitfall to implementing a layered defense? Write a letter to the editor at editors@ziffdavis.com

Next page: A New Look At Layers