Demilitarized Zones (DMZ) have long been used to describe an area where no
military equipment or personnel is allowed to help prevent conflict between two
nations. This is the case on the 38th parallel that separates North
and South Korea. Computer network designers took this same concept and developed
a computing solution that creates a safe zone between an organization’s computer
network and the public Internet.
Just as South Korea can enter the DMZ but can’t enter North Korea, attackers
can only enter the DMZ but not the organization’s main computer network. This
allows an organization to know when an attacker is striking before important
information in the network is compromised.
Today, most organizations use DMZ solutions to protect their externally
facing web presence from cyber-attacks, but some corporations and government
agencies have leveraged DMZs for directory federation, SaaS offerings and other
While DMZ solutions aren’t going anywhere in the next 10 years, they may be
replaced with a more secure, centralized solution called Cloud Broker
technology, which will create a permanent DMZ-type connection to every
organization that connects to it.
Just like DMZ solutions, the Cloud Broker can host solutions for web
presence, directory services connections, and security and monitoring, but only
one Cloud Broker is needed to handle multiple computing tasks instead of many
DMZ solutions. This allows the Cloud Broker to create a greater security
boundary than DMZ solutions.
The patching and management of the Cloud Broker would also be contracted out
as opposed to worked in-house, which would eliminate headache and keep an
organization’s network safe and secure.
While DMZ solutions aren’t going away tomorrow or in the near future, the
Cloud Broker offers another way to keep an organization’s network safe and