Securing your endpoints like servers, desktop computers, IoT devices, tablets, phones, etc. is not an easy task.
“The only safe computing device is a cold, dark, unplugged, and disconnected one.”
Well, that type of endpoint does not have many use cases. Maybe as a sinker…
Endpoints are usually interconnected in a network, consisting of routers, switches, and firewalls. Some are physical and some virtual. The purpose of the network is to let data flow in controlled paths between servers or servers and end-users. The firewall is the path that connects your network
to the internet and thereby your customers to your services.
Some of your customers might not be “customers” but they use the open path in your network to knock on your authentication door in order to find out if they can enter. They are hackers and brute force is their tool.
You can greatly enhance the security of your network by preemptively blocking known offenders at the gate, i.e. at the firewall level. Learn more about how this is done in our next section.
Continue reading…
Global Blocklist
When you think of IT attacks, you may think of targeted attacks against a company. But a large part of attacks are attackers going from company to company, from server to server, trying to attack everything they can in the hopes of gaining access somewhere, or just to inconvenience and disrupt. These …