The Security Perimeter Is Dead. Long Live the New Endpoint Perimeter.
The network no longer provides an air gap against external threats, but network access for devices can take up the slack. The fall of the enterprise perimeter is like the falling of a wall. It has created a new security landscape in which each endpoint, no matter from where it connects, has become its own perimeter — a weakness that can give adversaries access to the entire network.
Here you can read about the best practices to implement in the enterprise to handle threats both inside and outside the physical enterprise perimeter, allowing organizations to provide remote branches and “traveling” endpoints the same security as their corporate headquarters.
Published in Darkreading.com