Multi Layered Network Security - Blog | Novosco
Blog

Novosco Blog

Expert opinions and experience from Novosco, one of the UK and Ireland leading managed service providers.

Multi Layered Network Security

Multi Layered Network Security

Multi Layered Network Security describes a series of strategies that collectively build a security protection plan to prevent malicious attacks from entering an environment and compromising systems and data.

There are five key network areas to consider when developing an infrastructure security posture:

  • Perimeter and Network

    Perimeter Security is critically important. Effective solutions include: antivirus, antispam, content filtering, intrusion detection, intrusion protection, firewall and virtual private network services, and network access control.

  • Server Security

    If hackers manage to access a server, then they have access to your core infrastructure. The server which is compromised may not contain the information they seek, but it is attached to other servers. Anti-malware protection, multi factor authentication, IP security and content filtering can help minimize this threat.

  • Client Security

    Attackers often attempt to compromise client systems to gain access. Threat prevention tools include antivirus, personal firewalls, threat protection and antispyware. Deploying a web security service which protects your end users from threats while surfing is an example of thwarting threats.

  • Data Loss Prevention or Protection (DLP)

    Data loss or theft can result in additional losses in customer trust and revenue. Implementing data loss prevention solutions can help find the critical balance between protection and access.

  • Application Security

    Hackers can exploit vulnerabilities in application code to access or manipulate the information within it. Employing next generation firewalls and two factor authentication to protect applications, and implementing security policies can prevent these risks.

Add another dimension

"Defence in depth" is a technique, originally used to describe a type of military strategy, designed to protect systems by utilising a variety of security layers.  For example, an organisation may have two different vendors supplying firewalls; if one is found to have a vulnerability or sensitivity, the other can effectively step in.

There is a need to utilise different building blocks to ensure comprehensive protection against threat management. However a balance needs to be achieved between cost and effective defence. Having dual firewalls and a dual antivirus, or even dual DDoS mitigation isn't always going to be commercially viable, while needlessly increasing complexity can sometimes do more harm than good.

Don't mark your own homework

Organisations should perform an audit to analyse what threats they've been exposed to in the past.  Boards don’t want to hear that your company is the next one in an increasing list of companies that have had security problems; they want reassurance that the measures they are spending money on really will protect and support the organisation.  So increasingly, organisations are looking outside their regular supplier/partner base to get an independent view of whether they are running an infrastructure which:

  • meets the business requirements from a policy perspective
  • represents value for money
  • is fit for purpose
  • performs optimally
  • satisfies “best practice” around security expectations

Multi Layered Network Securrity

Recently we have conducted work for a range of clients for whom we are not the incumbent service provider.  These range from detailed reviews of network or security configuration, through design/performance reviews, up to high level management consulting around policy.

Specific examples include:

  • Security Audit
  • Firewall Ruleset Audit
  • Firewall rule-set and Configuration Audit
  • Wireless infrastructure Audit
  • Remote Access Audit
  • Network Infrastructure Audit

We provide an independent perspective on what we find, whether that’s the reassurance that everything is as it should be, or recommendations for improvements to meet the organisations’ objectives.

Ransomware - 3 steps to protection
Sourcing the skills you need, when you need them
 

Comments 1

Steffan Thomas on Friday, 24 August 2018 10:34

Good very informative blog!
You have shared very useful information. I am highly impressed. Thanks for sharing it.
These blogs are also good ones: https://www.bristeeritech.com

Good very informative blog! You have shared very useful information. I am highly impressed. Thanks for sharing it. These blogs are also good ones: https://www.bristeeritech.com
Already Registered? Login Here
Guest
Sunday, 23 September 2018

Blog Categories