Establishing a Logical Perimeter: The Evolution of Network Security

An enterprise’s most basic assets (employees, applications and data) are becoming increasingly flexible and independent from traditional notions of location and hardware. Unfortunately, the same is not true of enterprise security, which remains anchored to the physical perimeter of the enterprise.

These shifts present a serious challenge for enterprise IT and security teams. If IT fails to keep pace with these evolving modern computing models, then the overall security of the enterprise will become opportunistic at best, or completely obsolete at worst.

To meet this challenge, the enterprise must evolve beyond the outdated notion of a physical perimeter to a model based on logical controls that consistently enforces enterprise policy irrespective of where an asset is located. Read more in this white paper.

Subscribe to the Developer Insider Newsletter

From the hottest programming languages to commentary on the Linux OS, get the developer and open source news and tips you need to know. Delivered Tuesdays and Thursdays

Subscribe to the Developer Insider Newsletter

From the hottest programming languages to commentary on the Linux OS, get the developer and open source news and tips you need to know. Delivered Tuesdays and Thursdays

Resource Details

Palo Alto Networks logo
Provided by:
Palo Alto Networks
Topic:
Networking
Format:
PDF