Demilitarized Zone (DMZ)

8th January 2020 | Cybrary Demilitarized Zone (DMZ)


The Demilitarized Zone (DMZ) is sometimes referred to as a “perimeter network”, its primary purpose is to add an additional layer of security for the organization’s LAN (Local Area Network). The DMZ is run as a small, isolated network that is placed between the internet and the private, or trusted, network, into which Internet-facing services can be placed such as Secure File Exchange services, web servers, and other Internet-accessible systems.  A compromise of these Internet-facing systems maintains the protection of the internal trusted network, and also allows the organization and security professionals time to detect and address breaches before they further penetrate the internal trusted network.

Does an SMB need a DMZ?

Most SMB’s can do without a DMZ. If you are an Accounting firm and you need to exchange critical and sensitive files with your clients, it’s suggested that you use a secure 3rd party file exchange service such as “Sharefile” instead of building your own and placing it in a DMZ.  The same would go for your Web Site which should be hosted by a service provider outside of your companies DMZ and LAN.

Source: Demilitarized Zone in Computing

To learn more about DMZ networks, watch this short video below.

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware groups are not breaking in organizations the same way they did five years ago. The entry methods have...

Read more
Malicious Chrome Extension Disguised as  a Business Tools

Malicious Chrome Extension Disguised as a Business Tools

If a Chrome extension promises to remove security pop-ups and generate MFA codes, that should make you...

Read more
Sneaky Browser Extensions Are Hijacking ChatGPT Sessions

Sneaky Browser Extensions Are Hijacking ChatGPT Sessions

Cyberattacks usually start with phishing emails or weak passwords. This one did not. Security researchers...

Read more