Rethinking the Network Architecture and the Security Layer
Technology vendors like to discuss the business value of our solutions, but we are often less keen to discuss deployment technicalities (this is mostly true for marketing folks like me).However, because the enterprise IT environment is undergoing a major transformation driven by Cloud and mobility, we need to reevaluate some of our core assumptions about enterprise architecture and best practices.
Historically, the enterprise network was physically bound to specific locations like the corporate headquarters, a branch office and a datacenter. When deploying a security solution to protect it all, the natural point for a layer of security was at the entry or exit point of the network. This was the way IT organizations implemented firewalls, intrusion prevention systems, email security gateways, data loss prevention and other security systems.