5 perimeter exposure challenges & how to resolve them

Common Perimeter Exposures and What You Can Do About Them

Cover

While certain types of attacks, such as phishing, are straightforward and easy to understand, other network attacks are more complicated and take a bit more studying to learn how to keep them out.

This white paper highlights 5 of the most common perimeter exposures, their unique threat vectors & how you can address them:

  • Remote desktop protocol (RDP)
  • Telnet
  • Exposed databases
  • Exposed engineering systems
  • Certificate issues

 

Vendor:
Palo Alto Networks
Posted:
Nov 18, 2021
Published:
Oct 4, 2021
Format:
PDF
Type:
White Paper
Already a Bitpipe member? Log in here

Download this White Paper!