Rethinking the Network Architecture and the Security Layer

  • October 6, 2015

Technology vendors like to discuss the business value of our solutions, but we are often less keen to discuss deployment technicalities (this is mostly true for marketing folks like me).However, because the enterprise IT environment is undergoing a major transformation driven by Cloud and mobility, we need to reevaluate some of our core assumptions about enterprise architecture and best practices.

Historically, the enterprise network was physically bound to specific locations like the corporate headquarters, a branch office and a datacenter. When deploying a security solution to protect it all, the natural point for a layer of security was at the entry or exit point of the network. This was the way IT organizations implemented firewalls, intrusion prevention systems, email security gateways, data loss prevention and other security systems.

Read more >

Idan Hershkovich

Idan Hershkovich

Idan is Cato Networks’ marketing director. He has extensive experience in digital marketing, IT software solutions, collaboration and enterprise mobility. Looking forward to revolutionizing the way network security is being managed.

More Posts

Idan Hershkovich

Author: Idan Hershkovich

Idan is Cato Networks’ marketing director. He has extensive experience in digital marketing, IT software solutions, collaboration and enterprise mobility. Looking forward to revolutionizing the way network security is being managed.