Summary
In this chapter, we learned about ZTNA technologies and some of the vendors in the ecosystem and how we can use those services to securely publish our internal services to end users to reduce the risk of ransomware. Then, we went into some of the ways that we can securely access management solutions to manage our Windows-based infrastructure using both built-in tools and third-party options.
Then, we went into DDoS trends and how DDoS attacks can affect businesses, and how we can protect ourselves against DDoS attacks at different levels.
Lastly, we went through network segmentation and some common best practices on how we should segment our network to reduce the possibility for attackers to do a lateral movement.
While we have focused on securely publishing services in this chapter, attacks can still happen. So, therefore, it is also important to be able to protect data so that attackers are not able to directly see the data if they manage to exfiltrate it. In the...