This is a dedicated watch page for a single video.
An IS Auditor is reviewing the network architecture of a company and notices that the DMZ is used to host the company's public-facing website, email servers, and VPN gateways. What is the security benefit of this DMZ configuration?