Five Real-World Tactics to Protect Your Enterprise Networks
Identify key mobile blind spots and take steps to protect data while in transit.
The number of available IP addresses in Internet Protocol version 4 (IPv4) is dwindling. Given the estimates that predict that addresses will be exhausted by 2012, the time is well nigh for companies to consider a transition strategy to IPv6.
But that may be looking too far ahead. Initially, most organizations will likely be running both protocols at the same time. So, in the short term, companies need to figure out how to deploy IPv6 securely on networks that are still using IPv4.
To address this need, the National Institute for Standards and Technology (NIST) created the Guidelines for the Secure Deployment of IPv6. As U.S. federal agencies have already been mandated to move to IPv6, this document, still in the public review stage, provides:
More from the Knowledge Network and IT Business Edge