Things that come to mind are having a hardware firewall solution, a bastion host machine for proxying connections, properly configured DMZ's if you have multiple network segments with different security levels, implementing firewalls between departments sot hat a breach doesn't open everything, a 'honey pot' machine that is never logged into ... etc.
 
----- Original Message -----
Thank you. That was good. One of the questions that I have is the text in bold. 
What kind of multiple lines of defense can someone use??  Does this mean
more then one firewall or just many layers of security.?? 

Reply via email to