70 likes | 195 Views
GIAC Enterprises Network Deployment Phase 1: The Perimeter. Rodney Caudle, Jay Radcliffe, and Jim Voorhees. Objectives. Protect the Critical Assets Manage Recurring Costs Minimize Implementation Time Ensure Supportability. Protect Critical Assets.
E N D
GIAC Enterprises Network DeploymentPhase 1: The Perimeter Rodney Caudle, Jay Radcliffe, and Jim Voorhees
Objectives • Protect the Critical Assets • Manage Recurring Costs • Minimize Implementation Time • Ensure Supportability
Protect Critical Assets • Layered Approach to Perimeter Security Architecture • 3 Layers: Routers, Firewalls, IPS • DMZ Zones (segregation) for additional visibility and protection • IPS instead of IDS allows for protection instead of detection
Manage Recurring Costs • Purchasing a product that includes maintenance of signatures and updates • Building an architecture around an all-in-one device • Selecting a vendor which provides options for long-term support
Minimize Implementation Time • All-in-One Solution consolidates firewall and IPS • Reduces the complexity • Reduces acquisition time • Purchase and Own Solution • Reduces acquisition time • May need to address long-term support (MSSP)
Ensure Supportability • IBM ISS offers • MSSP Option Native (not partner) • All-in-One Device • Additional Features • Staff Familiarity
Conclusion • All-in-One Solution from IBM ISS • Exceeds the requirements • Simplifies implementation • Reduces recurring costs • Long-Term Support Options Available