Intelligent CIO Middle East Issue 03 | Page 14

LATEST INTELLIGENCE PRESENTED BY PROTECTING YOUR NETWORK FROM THE INSIDE-OUT Internal Segmentation Firewall (ISFW) Download whitepaper here F or the last decade organizations have been trying to protect their networks by building defenses across the borders of their network. This includes the Internet edge, perimeter, endpoint, and data center (including the DMZ). This ‘outsidein’ approach has been based on the concept that companies can control clearly defined points of entry and secure their valuable assets. The strategy was to build a border defense as strong as possible and assume nothing got past the firewall. As organizations grow and embrace the latest IT technology such as Mobility and Cloud the 14 INTELLIGENTCIO traditional network boundaries are becoming increasingly complex to control and secure. There are now many different ways into an enterprise network. Not long ago, firewall vendors marked the ports on their appliances ‘External’ (Untrusted) and ‘Internal’ (Trusted). However, advanced threats use this to their advantage because, once inside, the network is very flat and open. The inside of the network usually consists of non-security aware devices such as switches, routers and even bridges. So once you gain access to the network as a hacker, contractor or even rogue employee, then you get www.intelligentcio.com