Archive by Author

Network Perimeter Security as a BCP Strategy

Network Perimeter Security as a proactive and preventive BCP Strategy Perimeter security includes the establishment of a controlled perimeter surrounding networks. All incoming traffic will be filtered, blocked, analysed using a secure architecture structure and as well as network devices such as routers, firewalls, IDS and IPS systems, and switches. The objective is to ensure […]