Resources Categorized: Network Security

There are a total of (25) items.
Perimeter
In cybersecurity, a perimeter refers to a defined boundary or edge around an IT system or network that separates it from the untrusted external environment. The purpose of a perimeter is to provide a first line of defense against unauthorized access, malware, and other security threats. The perimeter is typically secured using a combination of technologies such as firewalls, intrusion detection sy
Lateral Movement
Lateral movement is a tactic used by attackers to move within a target network and gain access to sensitive systems and data. This involves the attacker exploiting vulnerabilities in systems and applications to gain access to new systems, and then using that access to move further into the network. This form of attack can take many forms, including the use of stolen credentials, exploiting vulnera
Cloud Network Security
Cloud network security refers to the measures taken to protect the confidentiality, integrity, and availability of data and systems in a cloud computing environment. This includes protecting the cloud infrastructure, virtualized systems, and communication channels used in cloud computing. Cloud network security measures may include firewalls, encryption, access control , monitoring, and threat det
IPsec: Tunnel Mode and Transport Mode
If you are looking to secure HTTPS-based applications, Pomerium is a better choice for speed, security, and ease-of-use. IPsec (Internet Protocol Security) is a protocol that provides security for IP-based communication. IPsec can operate in two modes: Tunnel Mode and Transport Mode. Tunnel Mode: In Tunnel Mode, the entire original IP packet is encapsulated in a new IP packet. The new packet is th
Secure Sockets Layer (SSL)
SSL (Secure Sockets Layer) is a cryptographic protocol that was widely used to provide security for Internet communications. It was originally developed to secure the transfer of sensitive information such as credit card numbers and other personal data over the Internet. However, SSL has been replaced by a newer protocol, TLS (Transport Layer Security), which provides equivalent security features
Virtual Private Network (VPN)
Virtual Private Network (VPN) is a technology in cybersecurity that creates a secure, encrypted connection between a device and a remote server over the internet. VPNs are used to provide secure remote access to a private network, such as an organization's internal network, by encapsulating and encrypting all data transmitted between the device and the remote server. This helps to protect sensitiv
Single Sign-On (SSO)
Single Sign-On (SSO) is an authentication method that enables users to access multiple applications or services with a single set of credentials (username and password). Instead of having to log in to each individual service separately, SSO provides a centralized authentication mechanism, which verifies the user's identity once and then grants access to all authorized services and applications. SS
Attribute-Based Access Control (ABAC)
ABAC (Attribute-Based Access Control) is a type of access control that defines access policies based on attributes (such as user role, location, time, and device) rather than roles or permissions. In ABAC, access decisions are made based on the evaluation of multiple attributes, rather than relying on a single factor (such as a user's role). The main advantage of ABAC is its flexibility. Because A
Identity Provider (IdP)
An identity provider (IdP) is a service or system responsible for managing and authenticating the identities of users and devices within a network. An IdP acts as a central authority that authenticates users and devices and provides them with a digital identity that can be used to access other systems and services. Identity providers are commonly used in Single Sign-On (SSO) environments, where us
Previous Page 2 of 3 Next

Revolutionize
Your Security

Embrace Seamless Resource Access, Robust Zero Trust Integration, and Streamlined Compliance with Our App.

Pomerium logo
© 2024 Pomerium. All rights reserved