One of the key concepts of security is defense in depth, and as such we should be trying to layer security. At the lower levels you may implement WEP, WPA, 802.1x or even EAP. Higher up at the IP layer we have IPSec. While it's just an add-on to IPv4 it is built in to IPv6. Tunnel and transport mode are two potential options.
Moving up to higher layers there are protocols such as Secure Sockets Layer (SSL) and Transport Layer Security (TLS.) At the top, or application layer, there are choices here such as PGP instead of clear text mail, SSH/SFTP as a replacement for FTP or even protocols such as DNS Secure.
Dig Deeper on Network Security Best Practices and Products
Related Q&A from Michael Gregg
Enterprise security expert, Michael Gregg answers a question regarding port 3389 issues when a user tries to open port 3389 RDP on their router to ... Continue Reading
Security expert Michael Gregg discusses the disadvantages to a layered approach to enterprise security. Continue Reading
Security expert Michael Gregg fields a question about unknown network cards gaining access to a user's network. Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.