Traditionally, data and IT infrastructure were effectively protected with a perimeter-based approach. This strategy worked well when we could readily identify what was “inside” and what was “outside” the perimeter.
Now, that’s all changing. It’s increasingly harder to define the perimeter, and even harder to defend it. One reason is that enterprises are transitioning to cloud-based infrastructure that not only faces traditional threats – like malicious insiders and application access vulnerabilities; they’re also facing some new threats – like BYOD, over-privileged users, and persistent access by third-parties.Read More On www.itproportal.com