
Securing your endpoints like servers, desktop computers, IoT devices, tablets, phones, etc. is not an easy task.
“The only safe computing device is a cold, dark, unplugged, and disconnected one.”
Well, that type of endpoint does not have many use cases. Maybe as a sinker…
Endpoints are usually interconnected in a network, consisting of routers, switches, and firewalls. Some are physical and some virtual. The purpose of the network is to let data flow in controlled paths between servers or servers and end-users. The firewall is the path that connects your network to the internet and thereby your customers to your services.
Some of your customers might not be “customers” but they use the open path in your network to knock on your authentication door in order to find out if they can enter. They are hackers and brute force is their tool.
You can greatly enhance the security of your network by preemptively blocking known offenders at the gate, i.e. at the firewall level. Learn more about how this is done in our next section.
