Server and Application Protection - Behind the Lines

Free registration required

Executive Summary

Cyber attacks can bypass or penetrate even top-of-the-line perimeter security, and it's increasingly recognized as a security best practice to provide server and application protection to detect and prevent these attacks as an integral part of a defense-in-depth strategy. A comprehensive server and application protection system will include: firewall, IDS/IPS, integrity monitoring, and log inspection technologies that enable systems to become self-defending. Driven by the growing awareness of targeted attacks and the insider threat - as well as by virtualization security concerns and pressures from PCI and other regulations and standards, and by high-profile security breaches - many organizations now actively evaluate the merits of investing in a server and application protection system to complement their existing IT security systems.

  • Format: PDF
  • Size: 533.1 KB