According to the SANS Institute, Defense in Depth is “the concept of protecting a computer network with a series of defensive mechanisms such that if one mechanism fails, another will already be in place to thwart an attack.” One component that nearly every organization deploys which contributes to this tactic involves the use of firewalls. But the addition of firewalls alone is not enough in today’s security climate.
When if comes to firewalls, you must be able to:
Monitor for abnormal activity, unexpected access attempts, and potential threats.
Eliminate downtime due to misconfigurations – knowing what changed and when, and having the ability to back up to last known good configuration.
Automate security audits and reports too not only verify security, but also compliance.
Watch this webcast as we discuss how some of the answers to your security troubles can be found in your firewall logs and how two SolarWinds solutions, Log & Event Manager (LEM) and Network Configuration Manager (NCM) can help.
Developed by network and systems engineers who know what it takes to manage today's dynamic IT environments, SolarWinds has a deep connection to the IT community.
The result? IT management products that are effective, accessible, and easy to use.