Get in Touch Close Menu

Network Perimeter Security

Perimeter Security Frequently Asked Questions

1. What are the typical controls in perimeter security?


The firewall determines which traffic will be permitted to enter your network based on a number of factors such as detecting malicious traffic. A next-generation firewall as described by Gartner is a “deep-packet inspection firewall that moves beyond port/protocol inspection and blocking to add application-level inspection, intrusion prevention, and bringing intelligence from outside the firewall.”

Intrusion Detection Systems (IDS)

The role of an IDS is to detect and then alerts administrators to malicious or suspicious activity.

Intrusion Prevention Systems (IPS)

In addition to the features provided by an IDS, an IPS solution will block the attack before alerting administrators to the breach.

Malware Protection

An effective antivirus or endpoint detection and response solution will provide additional defence in depth against cyber attacks.

2. What the different types of firewalls?

Packet Filtering

Takes into consideration the data in the header of each packet and then chooses to allow or block the traffic.

Proxy Service

Network security that protects while filtering messages at the application layer.

Stateful Inspection

Intuitive packet filtering that monitors active connections to determine which network packets to allow through the Firewall.

Next-Generation Firewall

Deep packet inspection Firewall with application-level inspection

3. Why do you need network perimeter protection?

Malware Protection

Defending your network against malware requires a layered approach to security. A firewall can help protect against various types of malware including viruses, worms, trojans, spyware, adware and ransomware.

Regulatory Compliance

Perimeter security controls are generally required for regulatory compliance and are often mandated to protect in-scope systems from the internet or exposure to the environment. The configuration of these controls and associated security policies play a crucial role in protecting the organisations network. The NCSC recommend robust network security controls as part of their 10 steps to cyber security. In addition to this, network perimeter security has an important role in other standards such as Cyber Essentials.