Skip to main content

Demilitarized Zone (DMZ)

In computer science, the term demilitarized zone (DMZ) is used to describe individual computers or smaller networks that form a kind of “neutral zone” between a company’s private network (intranet) and the public network (Internet). The use of DMZs prevents direct access to internal company servers by external users.

The term demilitarized zone is used in reference to the buffer zone between North and South Korea, which was established in the 1950s. A demilitarized zone in internal company networks is a sensible option to provide more security in addition to firewalls and other measures.

Demilitarized Zone (DMZ) as a sensible security measure

In smaller companies, a demilitarized zone (DMZ) is usually set up as a separate computer (host) through which all requests from users within the private network to external servers are realized. However, a DMZ is not able to forward requests into the private network.

Users from public networks can only access the demilitarized zone, so access to internal company data and resources in the private network is not possible. Thus, hacker attacks and other cybercriminal activities are already effectively prevented in the demilitarized zone (DMZ).

Advantages of a DMZ at a glance

[su_list icon=”icon: hand-o-right” icon_color=”#187bc0″ indent=”-5″]
  • monitors all outgoing network connections
  • provides first class network security in combination with a firewall
  • incoming network connections are not feasible
[/su_list]

Do you have any more questions?

Please contact us


Further contents