There are many parts to a Defense-in-Depth security model. I will cover two technologies that should be part of every security model. Firstly, the IP and DNS blackholes provide blocking for known malicious and known threats from outside your network based on their name or network address. Some commercial providers provide this type of service for web hosting and business. These tools protect network traffic just like the common antivirus or anti-malware tools protect files. Secondly, blocking IP’s and names using these two blackholes tools will improve your network security posture and reduce risk. Blocking threats before they enter the network or when they try and leave the network is key to this technology. Lastly, if you want to implement or understand more, reach out and I can provide more information.

image of blackhole

 

https://www.1stgatekey.net, https://blog.1stgatekey.net, https://www.totalzerotrust.com