Rethink network security outside the box
Preventing bad guys from compromising an organization has historically been executed based on a basic concept: establish a perimeter, and control who and what goes in and out. This concept has stood the test of time. In medieval days, guards depended on moats. In the digital age, IT professionals deploy firewalls. Simple, right?
If it were twenty years ago, or even ten, I’d say yes. However, today’s threat landscape is evolving too quickly, and security is becoming more complex. We now live in a world in which every IT element requires its own point solution to keep it secure – devices require endpoint protection, networks require firewalls, applications require multi-factor authentication or web application firewalls, databases require encryption and monitoring, etc.