Rethink network security outside the box

  • June 20, 2016

Preventing bad guys from compromising an organization has historically been executed based on a basic concept: establish a perimeter, and control who and what goes in and out. This concept has stood the test of time. In medieval days, guards depended on moats. In the digital age, IT professionals deploy firewalls. Simple, right?

If it were twenty years ago, or even ten, I’d say yes. However, today’s threat landscape is evolving too quickly, and security is becoming more complex. We now live in a world in which every IT element requires its own point solution to keep it secure – devices require endpoint protection, networks require firewalls, applications require multi-factor authentication or web application firewalls, databases require encryption and monitoring, etc.

Idan Hershkovich

Idan Hershkovich

Idan is Cato Networks’ marketing director. He has extensive experience in digital marketing, IT software solutions, collaboration and enterprise mobility. Looking forward to revolutionizing the way network security is being managed.

More Posts

Idan Hershkovich

Author: Idan Hershkovich

Idan is Cato Networks’ marketing director. He has extensive experience in digital marketing, IT software solutions, collaboration and enterprise mobility. Looking forward to revolutionizing the way network security is being managed.

Read More