A company’s network was connected to an infinite number of other networks, expanding the company’s perimeter far and wide. Then, the Internet linked personal computers to essentially every other personal computer. The perimeter grew, but it was still simple to control access to the network. Then came the keyboard, monitor, and desktop computer, which extended to the network to those devices. The perimeter of the network was very clear. The computer/mainframe was locked in a dedicated room, and the only source of inputs and outputs were handled manually. It used to be easy to define a network's perimeter. As such, it is also the first point of contact for many external threats to your network. It is the outer edge of what you can control and have a responsibility to safeguard. Your perimeter is the point to which you have control of your network, technology, and data. The Perimeter of your network is the demarcation between you and third parties such as vendors, partners, and the Internet. By taking this journey, you are making long strides toward building a culture of security that will endure for years, weather future challenges, and meet every compliance and regulatory requirement you face. Note: Today is week 3 of a 9-week blog series in which we are peeling back the 7 Layers of Data Security.
0 Comments
Leave a Reply. |