An Interview with Dávid Horváth, Quadron’s IT security engineer
Perimeter and endpoint security are fundamental to protecting corporate networks from both external and internal threats. Perimeter security tools—such as firewalls, proxies, and Web Application Firewalls (WAFs)—play a crucial role in defending against external intrusions. These solutions enforce key security functions like blocking unauthorised connections, managing port access, and controlling application permissions. They are particularly vital for companies operating externally hosted applications, such as payment services or websites.
How Essential Are Firewalls and Other Security Tools for Businesses? What Services Do You Offer for Their Implementation and Maintenance?
Firewalls, along with WAFs and proxies, are essential for any company whose employees access the internet. Their necessity is unquestionable—an absolute requirement. Our services include hardware deployment, expert consultation, and ongoing support. If a client lacks an in-house technical team, we fully manage their firewalls and security systems.
How Are Firewalls and Related Services Sold, and How Common Is the Demand for Support Services?
When selling firewalls and security solutions, our sales team assesses client needs, including required functionalities and user base size. While many companies handle their firewall management internally, it’s common for them to seek support for deployment and maintenance. This support is particularly valuable when in-house IT staff are handling multiple responsibilities, making our services a significant operational advantage. In practice, most clients opt for ongoing support, which we recommend with every firewall sale.
What Added Value Does Your Support Service Provide, and What Availability Do You Offer?
Our support services provide significant added value, extending beyond hardware provision to include expert knowledge and hands-on assistance. For specialised cases, such as Fortinet firewalls, our expertise is particularly valuable, as we hold the necessary certifications and subcontractor partnerships. We offer weekday support, eight hours a day, which has proven to be sufficient for our clients’ incident response needs.
What Is Perimeter and Endpoint Security, and What Are Their Key Components?
Perimeter and endpoint security address distinct yet interconnected areas of cybersecurity. Perimeter security relies on technologies such as firewalls, WAFs, and proxies, while endpoint security includes Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) solutions. Although companies often use both, they may require enhancements in one area over the other.
How Do Perimeter and Endpoint Security Work Together? What Role Do SOC and SIEM Systems Play?
Perimeter and endpoint security solutions can be integrated with Security Operations Centres (SOC) and Security Information and Event Management (SIEM) systems, enabling comprehensive threat management. SIEM platforms consolidate security event data in a centralised hub, generating alerts based on insights from perimeter and endpoint protection tools. This holistic approach ensures optimal network security, whether deploying new infrastructure or enhancing existing systems.
What Role Does Endpoint Security Play in Cybersecurity Strategy? What Key Functions Does It Serve?
Endpoint security is a cornerstone of cyber defence, as it operates directly on user devices (workstations, laptops, and mobile devices). It includes software that blocks malware, restricts access to dangerous websites, and enforces device control policies (e.g., USB usage limitations). EDR solutions detect and respond to threats at the endpoint level, while XDR provides deeper context and analytics for enhanced cybersecurity measures.
How Does Endpoint Security Differ from Perimeter Security? Where Do They Overlap?
While perimeter security is centrally managed and focuses on regulating network traffic through firewalls, proxies, and WAFs, endpoint security operates at the user device level, preventing malicious activities and data breaches. Some endpoint solutions even include firewall capabilities, allowing them to manage network connections. This overlap provides smaller businesses with a comprehensive security solution without requiring dedicated perimeter security infrastructure.
How Do Perimeter and Endpoint Security Work Together to Ensure Regulatory and Standards Compliance?
The integration of perimeter and endpoint security is crucial for regulatory compliance, such as ISO standards and other security frameworks. This dual-layered approach enables companies to protect their data and infrastructure comprehensively against cyber threats, ensuring they meet industry security requirements and strengthen their overall resilience.