Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

Combining Network and Perimeter Security to Mitigate Attack Risks

By Dave Kloba
November 10, 2014

Data security used to be relatively simple. Office buildings and areas within them presented clear “perimeters” that companies could protect with locks, alarms, and if necessary, searches of belongings. “External endpoints” that needed protection amounted to briefcases that employees might lose. With the rise of computing and data stored on corporate servers and PCs, firewalls emerged to protect the network, and various methods prevented information from leaving the company on disks. Today, however, perimeter protection is vastly more complicated, and corporate data is accessible by an array of endpoints – laptops, tablets and smartphones – that represent an ever-changing perimeter with ever-evolving risks of serious data breaches. As a result, protecting data now requires a dual approach to security: traditional “inside” network security to protect data on servers, and “outside” perimeter security to prevent the use of endpoints to circumvent network security.

According to a recent Dell Global Security Survey, mobility, cloud computing and the Internet of Things are introducing a slew of new risks, and there’s a rise in accidental and malicious internal breaches. The survey also found that 76 percent of IT leaders polled (93 percent in the U.S.) agreed that combating today’s threats requires companies to protect their entire perimeter – inside and outside the organization – by increasing network and endpoint security.

While most companies already understand the need for a robust firewall to protect data on corporate file systems, many don’t yet know what it takes to protect endpoints and data during transmission. The most effective way is with a highly coordinated, holistic security plan using multiple, integrated tools that can adapt to evolving threats, changing business requirements and specific company risk profiles.

Amerijet International, an airline with presence in Latin America and the Caribbean, and Cresa, a corporate real-estate company, have successfully implemented such programs to protect data and lower the risk of breaches.

Amerijet carries more than 200 million pounds of freight annually to over 550 destinations worldwide. The company recognized that supporting its growth would require upgrading existing technology systems to provide maximum availability for critical applications. Using a holistic approach, Amerijet deployed the following capabilities.

By installing a next-generation firewall and centralizing firewall management, the company gained visibility into the application layer across the entire firewall. Previously, Amerijet had to configure each firewall device separately. Now the company can configure its entire environment from a single application.A separate firewall for the airline’s virtual private network ensures safe connectivity for remote workers at nearly 100 global locations.

In addition to the firewalls, a sophisticated systems management appliance with multiple, integrated capabilitiesprovides tightly integrated intrusion detection and prevention, sophisticated malware protection as well as powerful application intelligence, control and visualization. The integration of these tools makes it far easier to provide visibility across multiple threat vectors. The appliance also provides high-speed deep packet inspection, enabling IT to analyze traffic, detect problems and quickly resolve issues – all without having to compromise performance. Finally, the appliance includes streamlined software inventory as well as distribution and patching to automate maintenance of endpoints and eliminate vulnerabilities associated with old and unpatched software.

Amerijet now has a combination of network protection and endpoint security, providing a strong inside and outside defense for vital systems. A key benefit of this multi-pronged approach is centralizing management of the entire environment to reduce complexity and increase efficiency. During a recent security audit, the company exhibited its newfound prowess, identifying a potential security issue within five minutes and addressing it immediately.

Cresa, an international commercial real estate brokerage based in Boston, offers a range of services, including strategic planning, transaction management, facilities management, workforce and location planning and lease administration. The company has more than 55 locations in North America with more than 100 additional locations worldwide.

A critical part of Cresa’s business is protecting client data. With government contractors as clients, the company needs to pass all security audits. Equally important, in the event of a security breach, Cresa would have to notify clients regarding possible data loss, causing significant damage to its reputation. To limit the possibility of security breaches and data loss, the company focused on deploying a solution for protecting its multitude of endpoints. Automating processes for updating software and deploying patches also was high on the company’s to-do list. IT needed to ensure users were running the latest versions of software, especially regarding anti-virus. Unfortunately, Cresa could not centrally manage the hodgepodge of endpoint systems, so IT could not automatically determine who didn’t have the latest and most secure software versions.

Like Amerijet, Cresa opted to deploy a systems management appliance that automates software distribution and patching as well as device discovery and inventory. This solution provides visibility into – and complete control over – the software environment, so administrators can easily see what software version is running on each system. It also provides security audit enforcement and reporting. The solution integrates with the company’s remote support tool and features a built-in service desk, which enables IT to easily manage about 1,000 user endpoint desktops or laptops.

With these tools and capabilities in place, Cresa can confidently protect client data and pass any required security audit. In addition, full automation of software distribution and patch management has reduced management time by more than 160 hours per year, letting administrators focus instead on more strategic initiatives.

In today’s highly distributed network environment, a corporate firewall simply isn’t enough. Only by deploying and centralizing the management of firewall, endpoint and data transmission protection can organizations gain the visibility and capabilities needed to protect data, thwart breaches and prevent leaks.

KEYWORDS: data breach data protection intellectual property security network perimeter network security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dave Kloba, general manager of endpoint systems management, and Patrick Sweeney, executive director of product management for Dell Software

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • computer

    How to mitigate critical cyber risks in a post-COVID-19 environment

    See More
  • cloud-enews

    How to Utilize the Cloud to Mitigate Cybersecurity Risks to Security Hardware

    See More
  • SEC0521-ProdSpot-Zenitel-slide10_900px

    Enables Clear Communication to Mitigate Risks

    See More

Related Products

See More Products
  • Career Network (60 days)

  • Career Network (30 days)

  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

See More Products

Events

View AllSubmit An Event
  • September 9, 2025

    Actionable Strategies to Mitigate Active Assailant Risk

    ON DEMAND: Active assailant incidents are surging — Are you ready? 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing