Hello loyal blog readers. Over the last few weeks I have been busy working on a network assessment for one of our fantastic customers. One of the areas we look at when assessing a customer’s network is how they are protecting/restricting access to the management plane of their network infrastructure.
So, you have invested in the latest generation of security appliances with their application aware policy capabilities, integrated IDS/IPS and URL filtering. All your endpoint devices have been deployed with the newest Advanced Malware Protection agents using the latest machine learning technology. You subscribe to the CVE feed and have a well-defined procedure to patch your entire environment at the first hint of a zero-day exploit. System and policy changes are required to go through rigorous change control, and if that’s not enough all your employees have been subjected to intensive information security training. One might think it’s time to relax put your feet up and grab yourself a nice cup of tea or favorite adult beverage.
Subscribe to the informative Newsletter to be Notified Updates in the Technology world.