Protecting Your Enterprise Network from Vendor App Servers?: "anomaly wonders: 'I work for a company with a large IT infrastructure. We have lots of applications in our environment. For a number of applications, vendors provide the apps, and provide core support to those app servers. Our vendors are notorious for demanding superuser access to the boxes that support their applications. To protect our enterprise network from attacks allowed in by well-meaning but less-than-perfectly-competent vendors, we have set up a quarantined network for each vendor. This works well when the model is ASP-like and all of the components live on a single box, but fails when the application needs to be connected to one or more enterprise applications (RDBMS, smtp, they want backup, etc) or when it needs to be connected to lots of target systems inside our environment on lots of different ports. How can I restrict a vendor/application server's access to our enterprise network while still providing platforms to make the applications productive for our user community?'"—Slashdot:
Saturday, November 27, 2004
About Me
- Name: Charlie
- Location: Austin, Texas, United States
Hi, I'm Charlie Wood. I'm the founder and former CEO of Spanning (acquired by EMC), a married father of two, a native Texan and Austinite, and the oldest guy in most of my classes at UT, where I'm adding an economics major to my computer science degree.
For more about my re-entry into academic life, read this blog's inaugural post.
Subscribe
Previous Posts
- Social engineering - where the user is the weakest...
- Malware: Fighting Malicious Code: "Adam Jenkins wr...
- How Much Harm Can One Web Site Do?: "Ben Edelman h...
- Hidden gold in corporate cleanup: "Corporations' r...
- Study: Tools Let Spyware Slip Through Cracks: "A r...
- Citrix to Acquire SSL VPN Provider: "Updated: Citr...
- SSL VPN security threatened by desktop search engi...
- Check Point Announces Immediate Availability of In...
- Security Expectations, Response Rise in India: "Th...
- McAfee Adds Real-Time Scanning to Zap Spyware: "A ...
<< Home