LATEST INTELLIGENCE
PRESENTED BY
PROTECTING YOUR NETWORK
FROM THE INSIDE-OUT
Internal Segmentation Firewall (ISFW)
Download whitepaper here
F
or the last decade organizations have
been trying to protect their networks
by building defenses across the borders
of their network. This includes the
Internet edge, perimeter, endpoint,
and data center (including the DMZ). This ‘outsidein’ approach has been based on the concept that
companies can control clearly defined points of
entry and secure their valuable assets. The strategy
was to build a border defense as strong as possible
and assume nothing got past the firewall.
As organizations grow and embrace the latest
IT technology such as Mobility and Cloud the
14
INTELLIGENTCIO
traditional network boundaries are becoming
increasingly complex to control and secure. There
are now many different ways into an enterprise
network.
Not long ago, firewall vendors marked the ports
on their appliances ‘External’ (Untrusted) and
‘Internal’ (Trusted). However, advanced threats
use this to their advantage because, once inside,
the network is very flat and open. The inside of
the network usually consists of non-security aware
devices such as switches, routers and even bridges.
So once you gain access to the network as a hacker,
contractor or even rogue employee, then you get
www.intelligentcio.com