Perimeter Security

Perimeter Security (PS) is basically the securing of a network to withstand an attack especially threats from outside the network. Due to the nature of threats from both outside and inside a network, PS is a very challenging form of security for a network. PS is also very essential to the performance of any network and the information systems such as databases, servers, workstations,  mobile devices etc. that rely on the network.  In order for any business or organization to apply a PS, they must understand why they need a PS, the pros and cons of a PS, the threats the business or organization is likely to encounter, and how best the business or organization can use PS to enhance their networks.

Since organizations and most businesses love making profits from the goods and services they provide to their customers, they clearly understand that investing a few dollars today to secure their network perimeter will go a long way to increase their profits. Hence, businesses and organizations do their very best to protect their networks from the havoc caused by attacks and threats.

Before a business or organization decides to implement a PS for their network, they intentionally focus on their network’s needs, and the threats or attacks they might face since attacks or threats vary from business to business. Once the business has made these identifications, they spend enormous amount of time researching the best way to effectively and efficiently use a PS to secure their network while meeting the goals of the business.

Article Source

http://blog.simplilearn.com/it-security-management/network-perimeter-security-design

 

Leave a comment