Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > Centrify > Who Moved My Secure Perimeter?
 

Who Moved My Secure Perimeter?

White Paper Published By: Centrify
Centrify
Published:  May 26, 2016
Type:  White Paper
Length:  12 pages

Before cloud computing, Software-as-a-Service, smart phones, tablets, and wearable devices, there was the data center. It defined an organization’s perimeter. IT established a secure perimeter around you and your organization’s sensitive information, protecting you from the rest of the Internet using firewalls, security appliances, VPNs and more.

Now, your organization’s sensitive information is everywhere. If you looked, you would find it on mobile devices, in the cloud and, of course, behind your firewall. So where is your secure perimeter?

This paper examines six common risks of this “perimeterless” world, and proposes six opportunities to strengthen security using Identity-as-a-Service.



Tags : 
security, endpoint security, access control, authentication