Demilitarized Zone (DMZ)

8th January 2020 | Cybrary Demilitarized Zone (DMZ)


The Demilitarized Zone (DMZ) is sometimes referred to as a “perimeter network”, its primary purpose is to add an additional layer of security for the organization’s LAN (Local Area Network). The DMZ is run as a small, isolated network that is placed between the internet and the private, or trusted, network, into which Internet-facing services can be placed such as Secure File Exchange services, web servers, and other Internet-accessible systems.  A compromise of these Internet-facing systems maintains the protection of the internal trusted network, and also allows the organization and security professionals time to detect and address breaches before they further penetrate the internal trusted network.

Does an SMB need a DMZ?

Most SMB’s can do without a DMZ. If you are an Accounting firm and you need to exchange critical and sensitive files with your clients, it’s suggested that you use a secure 3rd party file exchange service such as “Sharefile” instead of building your own and placing it in a DMZ.  The same would go for your Web Site which should be hosted by a service provider outside of your companies DMZ and LAN.

Source: Demilitarized Zone in Computing

To learn more about DMZ networks, watch this short video below.

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Welcome to our two-part blog series on Microsoft’s new email security enhancement now included in Office 365 P1...

Read more
Why Hackers Love MSPs and What We’re Gonna Do About It

Why Hackers Love MSPs and What We’re Gonna Do About It

"Being an MSP today is like wearing a neon sign that says, ‘Hack me! I’m the gateway to 100...

Read more
Stop the Swap: How to Protect Yourself from SIM Swapping Attacks

Stop the Swap: How to Protect Yourself from SIM Swapping Attacks

Ever had your phone suddenly lose service for no reason, followed by a flood of “reset your password”...

Read more