Security

What is a demilitarized zone?

Demilitarized zones: internal network protection

Companies hosting their own websites, an online shop, or e-mail inboxes should make sure to separate the corresponding server of these from the local network. This makes it possible to protect devices within the company network from hacker attacks that take place on public networks. Solid protection comes in the form of a demilitarized zone, which separates endangered systems from sensitive...

Hardware firewall: the more stable firewall solution

Hardware firewall – the external security system

Most computer users are at least aware of the term firewall. When activated, they help protect computers. But announcements about blocked applications can become a source of irritation for many users, especially when the background information for such messages is unknown. But how do firewalls work? And what role do hardware firewalls play in protecting your computer?

IPsec: security architecture for IPv4 and IPv6

Secure network connections with IPsec

A big problem with the previous Internet Protocol version, IPv4, was the missing guarantee of security standards of integrity, authenticity, and confidentiality. This previous protocol lacked the necessary means to identify data sources or enable secure transport. The protocol suite IPsec, developed for IPv4’s successor, IPv6, has changed the situation for Internet Protocol overnight.


Get your own .US domain now, the first year is free!



Limited time offer*





Enter the web address of your choice in the search bar to check its availability.
* Offer valid for customers with a bona fide US presence. Promotion ends on August 31, 2019.