Download now Free registration required
Over the past 15 years the rationale for firewall deployment has changed from being primarily a perimeter security defence solution to a pervasively deployed security zoning technology. This is as a result of the realisation that the hard shell approach to information security and protection is no longer adequate where third party collaborative connectivity, consumerisation and always on mobile communications are common. However, with this expansion of firewall deployment comes added complexity with multiple layers of firewalls and complicated firewall rule-sets, separating customers, partners, users, applications and data repositories. Any mis-configuration could result in a loss of system functionality, or worse, the accidental opening up of systems and information to the wrong audience.
- Format: PDF
- Size: 360.6 KB