Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Feature: The Survivor's Guide to 2004: Security: Page 3 of 12

Because HIP products lock down systems, you'll have to modify any change-control processes to include the modification of the HIP and the updating of the access-control policies when patching a protected system or application. Also, because everyday business applications are so complex, host security products must learn normal application behavior and how to enforce it.

Embrace the Desktop Firewall

The next line of defense is the desktop. If that's where the data is, shouldn't that be where the protection is concentrated? We lay out an asset-centric view in "Secure to the Core". If you don't have a desktop-firewall deployment for remote users, make it a priority. Properly configured desktop firewalls stop attacks from external users, and may be effective in combating the spread of worms by preventing the worm code from accessing network resources.





E-poll results: Best of Breed or Single Vendor