Demilitarized Zone (DMZ)

8th January 2020 | Cybrary Demilitarized Zone (DMZ)


The Demilitarized Zone (DMZ) is sometimes referred to as a “perimeter network”, its primary purpose is to add an additional layer of security for the organization’s LAN (Local Area Network). The DMZ is run as a small, isolated network that is placed between the internet and the private, or trusted, network, into which Internet-facing services can be placed such as Secure File Exchange services, web servers, and other Internet-accessible systems.  A compromise of these Internet-facing systems maintains the protection of the internal trusted network, and also allows the organization and security professionals time to detect and address breaches before they further penetrate the internal trusted network.

Does an SMB need a DMZ?

Most SMB’s can do without a DMZ. If you are an Accounting firm and you need to exchange critical and sensitive files with your clients, it’s suggested that you use a secure 3rd party file exchange service such as “Sharefile” instead of building your own and placing it in a DMZ.  The same would go for your Web Site which should be hosted by a service provider outside of your companies DMZ and LAN.

Source: Demilitarized Zone in Computing

To learn more about DMZ networks, watch this short video below.

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

QR Codes Are Back (They Still Want Your Password)

QR Codes Are Back (They Still Want Your Password)

Remember 2020? We scanned QR codes for everything. Restaurant menus. Parking meters. That awkward moment at a...

Read more
AI-Powered Phishing Kits Are Game-Changing, In a Very Bad Way

AI-Powered Phishing Kits Are Game-Changing, In a Very Bad Way

Phishing emails used to be easy to spot. Bad grammar. Weird links. Obvious scams. Those days are...

Read more
AI Poisoning: Fake Support Scam — AI Search as the New Attack Surface

AI Poisoning: Fake Support Scam — AI Search as the New Attack Surface

Cybercriminals always follow Internet eyeballs. Not literally, but figuratively. And today's eyeballs are...

Read more