More about the SANS SEC530: Defensible Security Architecture course: www.sans.org/SEC530
Presented by: Justin Henderson, SANS Certified Instructor and Course Author
A majority of organizations deploy the perimeter security architecture. This model involves securing what goes into or out of your environment. Firewalls and border gateways act as security checkpoint similar to airport security. Yet this model is deeply flawed and insufficient. Join the first part of this webcast series to identify why perimeter security is failing us. Subsequent webcasts will then go into details on filling the gaps left over.
This webcast focuses on the weaknesses of a perimeter architecture, and also goes into how the perimeter security architecture mindset is baked into most security technologies today.