Network Security: The New Perimeter

Hoover, Mark
July 2005
Business Communications Review;Jul2005, Vol. 35 Issue 7, p40
Trade Publication
The article reports that for many years, IT managers have been focusing their network security dollars and energies on securing the LAN/WAN boundary, referring to that critical juncture as the network perimeter. Their assumption--that the primary risks of attack or disruption came from outside the corporate network--held until recently. Today, however, portable devices are regularly connected to corporate network resources from inside and outside the old WAN perimeter. Attacks and infections can come from anywhere, whether carried into the company on the laptops, PDAs and storage sticks used by traveling workers, or transmitted over the wireless and Internet Virtual private networks (VPN) links they use to check in remotely. It will be some time before one has anything like best practices for an overall New Perimeter solution. New products are on the way, older products are being upgraded, and enterprise IT shops need time to experiment with the various approaches. The most important thing to realize at this point is the need to defend the pervasive New Perimeter--really every endpoint, whenever and wherever it attaches.


Related Articles

  • Netgear Debuts Access Points, Upgrades Firewalls. Eddy, Nathan // eWeek;10/14/2014, p1 

    The article evaluates the Dual Band 802.11ac Wireless Access Point, the Dual Band High Powered 802.11n Weatherproof Outdoor Access Point, the ProSafe FVS318G virtual private network (VPN) Firewall and the ProSage Dual wide area network (WAN) Gigabit Firewall from Netgear.

  • Enterprise WLAN security meets small offices. Kistner, Toni // Network World;9/13/2004, Vol. 21 Issue 37, p33 

    This article reports that small companies and branch offices requiring strong network security have often had to pass up the benefits of a wireless network rather than deal with the cost and complexity of installing and maintaining an authentication server or IPSec virtual private network....

  • CISCO SIMPLIFIES VPN SECURITY ON ROUTERS, SHIPS 2M IRS.  // CRN;12/11/2006, Issue 1223, p15 

    The article reports that Cisco Systems Inc. has added new security and wide-area-network optimization capabilities to its Integrated Services Router (ISR) line. The ISR line combines routing and switching capabilities with advanced services. Cisco also launched its integrated tunnel-less virtual...

  • The new network switch. Cummings, Joanne // Network World;2/6/2006, Vol. 23 Issue 5, p32 

    The article reports that next-generation LAN switches will not only offer built-in security, but will also provide application optimization and policy enforcement. Future switches will have the ability to handle a number of application optimization functions, such as Web acceleration, server...

  • BP turns its back on traditional IT security with internet access to company systems. Saran, Cliff // Computer Weekly;9/7/2004, p10 

    This article reports that oil Business Apps Oil giant aims to provide 60% of employees and third-party users with secure access to corporate systems, including applications, through a web browser. Thousands of BP staff, almost 10% of the workforce, will access the oil producer's business...

  • Beware of spies in the machine. Corbelli, Martine // Computer Weekly;9/7/2004, p23 

    This article focuses on Internet security. While spyware is widely used to track the patterns of individual users' Internet usage, there is an unexplored and more sinister side to the tracking technology that could pose a real threat to corporate security. In the same way that advertisers can...

  • SONICWALL INTERNET THREAT DEFENDS AGAINST "BOTWAR".  // Computer Security Update;Oct2005, p3 

    This article reports that SonicWALL Inc. has announced that users of its Internet threat prevention technology are protected from the attacks that have taken down computers across the United States. Combining deep inspection firewall appliance, gateway anti-virus, anti-spyware and intrusion...

  • ZONE OF DEFENSE. A. C. K., Amanda C. // Entrepreneur;Apr2004, Vol. 32 Issue 4, p42 

    When customers need a firewall for their home office or very small office, ZoneAlann Pro leads the pack. It offers protection from everything from worms to spyware. ZoneAlarm Pro's ad-blocking and cookie-control features make the Internet a safer place to be. But this software is compatible with...

  • Ahead of rootkit talk, Cisco patches router flaw.  // Network World;5/26/2008, Vol. 25 Issue 21, p10 

    The article offers news briefs related to information technology. Cisco Systems Inc. has issued three security patches that fix bugs that could crash its products. Silver Peak Systems Inc. introduces 1Gbps version of Wide Area Network-optimization box geared to high volume data centers traffic...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics