Overview
When developing an enterprise security strategy, a layered approach is the best method to ensure detection and mitigation of attacks at each tier of the network infrastructure. Although it is changing, the enterprise network perimeter to the outside world remains the same and the basic network security mechanisms still have their purpose. In general, the same types of security mechanisms need to persist, however, where they are implemented may change slightly depending upon the network architecture. Our approach to securing the network will not focus much on where the network perimeter is, but on what needs to be protected.
In Chapter 2, Security Architectures, we discussed how emerging technologies are playing a fundamental role in the paradigm reset of the network and security architecture, design, and implementation. Bring your own device (BYOD) initiatives and the increase in need to share business critical data require network and security architects to be agile and find unique...