December 10, 2016

Crypto-Segmentation: Minimize your Enterprise Attack Surface


The reality is that no network, device, user or application can be "trusted" - at least, not by traditional NAC's definition. Modern applications don't respect the perimeter as they are routinely accessed and shared beyond the firewall. 

Users often fail to adhere to security protocols, continuously introduce personal devices, utilize consumer-grade apps, and access corporate data from remote locations. For these users, the firewall doesn't exist. As enterprises add cloud services, Internet of Things, and other innovations, the perimeter of the firewall becomes less relevant than ever. 

Forrester refers to this as Zero Trust security architecture.  Continue reading...


Leave a comment

Get E-News and Notices via Email


  

 



  

I accept Webtorials' Terms and Conditions.

Trending Discussions

See more discussions...

Featured Sponsor Microsites






















Recent Tweets

Archives

Notices

Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information.  Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site.  Please encourage colleagues to download their own copy after registering at http://www.webtorials.com/reg/.  Continuing past this point indicates your acceptance of our terms of use as specified at Terms of Use.

Webtorial® is a registered servicemark of Distributed Networking Associates. The Webtorial logo is a servicemark of Distributed Networking Associates. Copyright 1999-2015, Distributed Networking Associates, Inc.