Monday, June 29, 2020

Word of the Day: deperimeterization

 
Word of the Day WhatIs.com
Daily updates on the latest technology terms | June 29, 2020
deperimeterization

In network security, deperimeterization is a strategy for protecting a company's data by using encryption and authentication at the data-level.

In the past, most security efforts were focused on protecting company data at the perimeter of the network. With the advent of ubiquitous connectivity and a mobile workforce, however, network administrators began to question whether the traditional border model of IT security was practical or cost-effective.

According to a survey from Netrounds, a network monitoring software provider, monetary damage from unplanned drops in network quality averages about $600,000 per organization. These costs can be avoided (or at least reduced) with the help of effective network management best practices that go beyond perimeter defense.

The concept of deperimeterization was recognized early on by Paul Simmonds of the Jericho Forum, a non-profit group dedicated to "the development of open standards to enable secure, boundaryless information flows across organizations." As early as 2004, Simmonds foresaw that a hardened perimeter security strategy would be impossible to sustain and was fundamentally at odds with an agile business model. Today, the concept of deperimeterization is closely aligned with the zero trust model. Continue reading about deperimeterization...

Quote of the Day

 
"Even when enterprises hid all their digital assets behind a firewall and bastion network, authorized users and attackers used dial-up connections and firewall exceptions to bypass the perimeter protection." - Peter Loshin

Learning Center

 

Achieve network perimeter security through deep segmentation
Firewall effectiveness is in deep decline, but there's still a way to create an effective security perimeter through the practice of deep segmentation. Learn how.

Top 5 reasons for a zero-trust approach to network security
As network perimeters disintegrate and enterprises adopt cloud computing, discover the top reasons organizations are opting for a zero-trust approach to network security.

What is a software-defined perimeter, and do I need it?
An evolving network world requires evolving network security. Learn how software-defined perimeter offers a compelling answer to network vulnerabilities.

How does an identity and access management framework work?
A comprehensive identity and access management framework is an IT necessity. But how do the two components work together?

What are some of the top identity and access management risks?
Identity and access management risks exist, but the benefits of IAM outweigh the drawbacks. What are some of the issues that might arise?

Quiz Yourself

 
What are network firewalls? Test your network security IQ
Firewalls date back to the beginning of the internet, which makes them an essential and longstanding part of network security. This quiz explores these changes and how each type of firewall differs.

Stay in Touch

 

For feedback about any of our definitions or to suggest a new definition, please contact us at: editor@whatIs.com

FOLLOW US

TwitterRSS
About This E-Newsletter
The Word of the Day is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2019 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

1 comment:

SAS Systems said...

SAS Systems Engineering takes pride in offering a wide range of practical, safe, and efficient fire protection systems, fire alarms, security systems, CCTV.Access Control, intrusion detection computerized monitoring, motion detection, perimeter protection, Closed Circuit Televisions (CCTV), burglar-alarm systems and fire alarms service in Saudi Arabia. Not only do we provide intrusion detection computerized monitoring and motion detection but also we provide perimeter protection, closed Circuit Televisions (CCTV), Burglar-alarm systems, Control centers (CMCCS), Metal and explosive detection, X-Ray scanners, Under-vehicle inspection systems, Automatic car-plate-recognition system. With the knowledge and experience of our highly skilled team of engineers, we are able to provide high quality solutions.