Talk With an Expert

Perimeter Defense-in-Depth with Cisco ASA

Perimeter Defense-in-Depth with Cisco ASA (PDF, 2.96MB)Published: 09 Feb, 2009
Created by
Michael Simone

No matter how tightly locked down one keeps one's internal systems, how religiously the system administrators apply patches, and how well educated about network threats the user base becomes, a weak perimeter security system turns an otherwise secure system into a castle with an empty moat.