Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

Combining Network and Perimeter Security to Mitigate Attack Risks

By Dave Kloba
November 10, 2014

Data security used to be relatively simple. Office buildings and areas within them presented clear “perimeters” that companies could protect with locks, alarms, and if necessary, searches of belongings. “External endpoints” that needed protection amounted to briefcases that employees might lose. With the rise of computing and data stored on corporate servers and PCs, firewalls emerged to protect the network, and various methods prevented information from leaving the company on disks. Today, however, perimeter protection is vastly more complicated, and corporate data is accessible by an array of endpoints – laptops, tablets and smartphones – that represent an ever-changing perimeter with ever-evolving risks of serious data breaches. As a result, protecting data now requires a dual approach to security: traditional “inside” network security to protect data on servers, and “outside” perimeter security to prevent the use of endpoints to circumvent network security.

According to a recent Dell Global Security Survey, mobility, cloud computing and the Internet of Things are introducing a slew of new risks, and there’s a rise in accidental and malicious internal breaches. The survey also found that 76 percent of IT leaders polled (93 percent in the U.S.) agreed that combating today’s threats requires companies to protect their entire perimeter – inside and outside the organization – by increasing network and endpoint security.

While most companies already understand the need for a robust firewall to protect data on corporate file systems, many don’t yet know what it takes to protect endpoints and data during transmission. The most effective way is with a highly coordinated, holistic security plan using multiple, integrated tools that can adapt to evolving threats, changing business requirements and specific company risk profiles.

Amerijet International, an airline with presence in Latin America and the Caribbean, and Cresa, a corporate real-estate company, have successfully implemented such programs to protect data and lower the risk of breaches.

Amerijet carries more than 200 million pounds of freight annually to over 550 destinations worldwide. The company recognized that supporting its growth would require upgrading existing technology systems to provide maximum availability for critical applications. Using a holistic approach, Amerijet deployed the following capabilities.

By installing a next-generation firewall and centralizing firewall management, the company gained visibility into the application layer across the entire firewall. Previously, Amerijet had to configure each firewall device separately. Now the company can configure its entire environment from a single application.A separate firewall for the airline’s virtual private network ensures safe connectivity for remote workers at nearly 100 global locations.

In addition to the firewalls, a sophisticated systems management appliance with multiple, integrated capabilitiesprovides tightly integrated intrusion detection and prevention, sophisticated malware protection as well as powerful application intelligence, control and visualization. The integration of these tools makes it far easier to provide visibility across multiple threat vectors. The appliance also provides high-speed deep packet inspection, enabling IT to analyze traffic, detect problems and quickly resolve issues – all without having to compromise performance. Finally, the appliance includes streamlined software inventory as well as distribution and patching to automate maintenance of endpoints and eliminate vulnerabilities associated with old and unpatched software.

Amerijet now has a combination of network protection and endpoint security, providing a strong inside and outside defense for vital systems. A key benefit of this multi-pronged approach is centralizing management of the entire environment to reduce complexity and increase efficiency. During a recent security audit, the company exhibited its newfound prowess, identifying a potential security issue within five minutes and addressing it immediately.

Cresa, an international commercial real estate brokerage based in Boston, offers a range of services, including strategic planning, transaction management, facilities management, workforce and location planning and lease administration. The company has more than 55 locations in North America with more than 100 additional locations worldwide.

A critical part of Cresa’s business is protecting client data. With government contractors as clients, the company needs to pass all security audits. Equally important, in the event of a security breach, Cresa would have to notify clients regarding possible data loss, causing significant damage to its reputation. To limit the possibility of security breaches and data loss, the company focused on deploying a solution for protecting its multitude of endpoints. Automating processes for updating software and deploying patches also was high on the company’s to-do list. IT needed to ensure users were running the latest versions of software, especially regarding anti-virus. Unfortunately, Cresa could not centrally manage the hodgepodge of endpoint systems, so IT could not automatically determine who didn’t have the latest and most secure software versions.

Like Amerijet, Cresa opted to deploy a systems management appliance that automates software distribution and patching as well as device discovery and inventory. This solution provides visibility into – and complete control over – the software environment, so administrators can easily see what software version is running on each system. It also provides security audit enforcement and reporting. The solution integrates with the company’s remote support tool and features a built-in service desk, which enables IT to easily manage about 1,000 user endpoint desktops or laptops.

With these tools and capabilities in place, Cresa can confidently protect client data and pass any required security audit. In addition, full automation of software distribution and patch management has reduced management time by more than 160 hours per year, letting administrators focus instead on more strategic initiatives.

In today’s highly distributed network environment, a corporate firewall simply isn’t enough. Only by deploying and centralizing the management of firewall, endpoint and data transmission protection can organizations gain the visibility and capabilities needed to protect data, thwart breaches and prevent leaks.

KEYWORDS: data breach data protection intellectual property security network perimeter network security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dave Kloba, general manager of endpoint systems management, and Patrick Sweeney, executive director of product management for Dell Software

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • computer

    How to mitigate critical cyber risks in a post-COVID-19 environment

    See More
  • cloud-enews

    How to Utilize the Cloud to Mitigate Cybersecurity Risks to Security Hardware

    See More
  • cybersecurity

    Top Tips to Lockdown Remote Network Security Now

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

See More Products

Events

View AllSubmit An Event
  • March 6, 2025

    Why Mobile Device Response is Key to Managing Data Risk

    ON DEMAND: Most organizations and their associating operations have the response and investigation of computers, cloud resources, and other endpoint technologies under lock and key. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!