4 perimeter network security strategies compared

Cover Image

Many of today's data centers are no longer on-premises. As cloud and mobile technologies extend the reach of network infrastructure, the notion of a network edge that relies on endpoint security no longer makes much sense. New network security models are required to define the network perimeter and how it can be defended.

In this issue of Information Security, we look at four enterprise strategies for perimeter network defense -- as companies move beyond traditional firewalls and network access control systems. Also inside, discover:

  1. API security and the rise of API management platforms and gateways
  2. President Barack Obama’s executive order to promote cybersecurity information sharing
  3. How companies can benefit by participating in collaboration
  4. And more
Vendor:
TechTarget Security
Posted:
Feb 8, 2021
Published:
Apr 30, 2015
Format:
PDF
Type:
Ezine
Already a Bitpipe member? Log in here

Download this Ezine!