| Word of the Day | | Daily updates on the latest technology terms | June 29, 2020 | | deperimeterization | In network security, deperimeterization is a strategy for protecting a company's data by using encryption and authentication at the data-level. In the past, most security efforts were focused on protecting company data at the perimeter of the network. With the advent of ubiquitous connectivity and a mobile workforce, however, network administrators began to question whether the traditional border model of IT security was practical or cost-effective. According to a survey from Netrounds, a network monitoring software provider, monetary damage from unplanned drops in network quality averages about $600,000 per organization. These costs can be avoided (or at least reduced) with the help of effective network management best practices that go beyond perimeter defense. The concept of deperimeterization was recognized early on by Paul Simmonds of the Jericho Forum, a non-profit group dedicated to "the development of open standards to enable secure, boundaryless information flows across organizations." As early as 2004, Simmonds foresaw that a hardened perimeter security strategy would be impossible to sustain and was fundamentally at odds with an agile business model. Today, the concept of deperimeterization is closely aligned with the zero trust model. Continue reading about deperimeterization... | | | "Even when enterprises hid all their digital assets behind a firewall and bastion network, authorized users and attackers used dial-up connections and firewall exceptions to bypass the perimeter protection." - Peter Loshin | For feedback about any of our definitions or to suggest a new definition, please contact us at: editor@whatIs.com | FOLLOW US | | About This E-Newsletter The Word of the Day is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.
Click to: Unsubscribe. You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com. © 2019 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners. Privacy Policy | Partners List | | |
1 comment:
SAS Systems Engineering takes pride in offering a wide range of practical, safe, and efficient fire protection systems, fire alarms, security systems, CCTV.Access Control, intrusion detection computerized monitoring, motion detection, perimeter protection, Closed Circuit Televisions (CCTV), burglar-alarm systems and fire alarms service in Saudi Arabia. Not only do we provide intrusion detection computerized monitoring and motion detection but also we provide perimeter protection, closed Circuit Televisions (CCTV), Burglar-alarm systems, Control centers (CMCCS), Metal and explosive detection, X-Ray scanners, Under-vehicle inspection systems, Automatic car-plate-recognition system. With the knowledge and experience of our highly skilled team of engineers, we are able to provide high quality solutions.
Post a Comment