Layered security

Layered security

Layered security is a new term used by information protection and online security vendors that describes the practice of leveraging several different point security solutions to protect the digital identities and information of consumer, enterprise or government environments.

Vendors will sometimes cite differing solutions, but most can be grouped under consumer or enterprise categories.


Consumer Layered Security Strategy
Extended validation (EV) SSL certificates
Multifactor authentication (also sometimes known as versatile or two-factor authentication)
Single sign-on (SSO)
• Fraud detection and risk-based authentication
• Transaction signing and encryption
• Secure Web and e-mail
• Open fraud intelligence network


Enterprise Layered Security Strategy
• Workstation and network authentication
• File, disk and removable media encryption
• Remote access authentication
• Network folder encryption
• Secure boundary and end-to-end messaging
• Content control and policy-based encryption


An ad-hoc security strategy can be sub-optimized with numerous vendors and an abundance of different, sometimes incompatible, security solutions and products. Seeking an entire layered security solution from a single vendor can sometimes help create interoperability, efficiency and cost-effectiveness.


Wikimedia Foundation. 2010.

Игры ⚽ Поможем сделать НИР

Look at other dictionaries:

  • Layered Voice Analysis — (LVA) Technology was developed in Israel, by Amir Liberman, Founder and CEO of Nemesysco. LVA is a security level technology designed for truth verification and detection of deceit. 129 vocal parameters are utilized in order to detect and measure …   Wikipedia

  • Layered Service Provider — A Layered Service Provider (LSP) is a feature of the Microsoft Windows Winsock 2 Service Provider Interface (SPI). A Layered Service Provider is a DLL that uses Winsock APIs to insert itself into the TCP/IP stack. Once in the stack, a Layered… …   Wikipedia

  • Security Practices and Research Student Association — The Security Practices and Research Student Association (SPARSA) is a Rochester Institute of Technology student run organization that addresses security related issues and how these issues affect multiple majors and disciplines. The ultimate goal …   Wikipedia

  • Layered Service Provider — Эта статья  об многоуровневом поставщике услуг. О принципе подстановки Лисков см. Принцип подстановки Барбары Лисков. LSP (Layered Service Provider, англ. многоуровневый поставщик услуг) технология Windows sockets версии… …   Википедия

  • Comodo Internet Security — version 5.8 Pro on Windows 7 …   Wikipedia

  • Cisco's 3 Layered Model — Over years of building network equipment, Cisco Systems has developed a three layered model. Starting with the basics, the Cisco network is traditionally defined as a three tier hierarchical model comprising the core, distribution, and access… …   Wikipedia

  • Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding …   Wikipedia

  • Certified Information Systems Security Professional — CISSP Logo Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by International Information Systems Security Certification Consortium (ISC)². (ISC)² is a self declared… …   Wikipedia

  • Maritime Safety and Security Team — A Maritime Safety and Security Team or MSST is a United States Coast Guard anti terrorism team established to protect local maritime assets. It is a harbor and inshore patrol and security team that includes detecting and if necessary stopping or… …   Wikipedia

  • Port Security Unit — United States Coast Guard Port Security Units are deployable units organized for sustained force protection operations. They can deploy within 96 hours and establish operations within 24 hours. PSUs conduct OCONUS port security in support of… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”