TECH DIGITAL RESOURCE LIBRARY

Beyond the Wall: Security in a Post-Perimeter World

Oct 06, 2010

Download Walls have served multiple purposes throughout history. The Great Wall of China defended against invaders, while the Berlin Wall kept citizens from freely traveling beyond the control of their rulers.

Network security relies on similar premises. For years network security professionals touted �perimeter security� as the primary solution to keep the bad guys out and the good guys in. However, just as guns and air attacks overcame protective walls,changes in malware attacks have rendered network firewalls and perimeter-centric security an ineffective defense.

Simultaneously, the increasingly mobile workforce makes an on-premise approach even more futile. Walls can no longer keep the bad guys out, nor can they keep the good guys in.

Welcome to the post-perimeter world.


Whitepaper