Rob Clyde Consulting Report: Beyond the Wall: Security in a Post-Perimeter World
Walls have served multiple purposes throughout history. The Great Wall of China defended against invaders, while the Berlin Wall kept citizens from freely traveling beyond the control of their rulers. Network security relies on similar premises. For years network security professionals touted “perimeter security” as the primary solution to keep the bad guys out and the good guys in. However, just as guns and air attacks overcame protective walls, changes in malware attacks have rendered network firewalls and perimeter-centric security an ineffective defense.
Please supply your email address to access the content.
Copyright 2013 IDG Communications. ABN 14 001 592 650. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited.