Consderations for Securing your environment
March 13, 2010Identify Access Points
In the electronically open organization…
• Who has access to your internal network?
– Employees in the office or remote, using VPNs
– Contractors, consultants, temporary workers
– Customers, suppliers, and partners via extranet
– Outsiders who have penetrated the perimeter
• Operations and resources are becoming more distributed – security must follow
• Perimeter firewalls, Network IDS systems, VPNs, & authentication are insufficient in this environment.