The Traditional Approach to Network Security: Defending the Perimeter
Traditional network security includes the implementation and maintenance of physical controls such as data center access, as well as technical controls including firewalls, hardened routers, and intrusion detection systems. To effectively prevent unauthorized intrusion and other harmful attacks targeting the enterprise's network, information security best practices require the proper configuration across multiple solution types and frequent patching of such security tools in addition to the network devices they were designed to protect.
A robust network security program will also address data security policies, contingency and disaster recovery planning, and the need for regular vulnerability scanning and penetration testing. By simulating a real-world attack on an organization's network, network penetration testing allows the enterprise to evaluate the effectiveness of its security controls and procedures and the behavior of IT staff in response to incidents.