ABSTRACT
Although one knows how and what is required to set up perimeter security and the management tactics for regulating an environment, there are a number of limitations that need to be addressed but are outside the scope of this book. These additional topics include:
Virus protection and scanning
Fault tolerance and load balancing
Reporting and management
Encryption acceleration
Public key infrastructure
Authentication
Intrusion detection
Backup and recovery
Each of these topics on its own is a lengthy discussion; but nonetheless, each must be addressed to fulfill the requirements of a well-founded security front. Once the initial constructs of an organization’s perimeter security have been put in place, time should be set aside to investigate options to integrate the above items into the corporate security model. These items are discussed in no particular order because each organization will have varied requirements and priorities.