Information Security Leader, Author, Instructor and Speaker

Bridging the gap between perimeter and host security

Posted on May 31, 2005 in Articles | by

Most organizations recognize the importance of information security and devote resources to an information security program with adequate technical controls. In many cases, controls are well-developed in the areas of controlling access to the network (perimeter protection) and fortifying individual systems on the network (host protection). We’re now beginning to see an increased emphasis on bridging the gap between these two areas with network-based security mechanisms.

Read the full article: Bridging the gap between perimeter and host security

Published in SearchSecurity on 05/31/05

TAGS: ,

Leave a Reply

Your email address will not be published. Required fields are marked *