Premium Content

Access "Security for the virtual enterprise"

John Taylor, Contributor Published: 05 Mar 2003

For almost a decade, security professionals have commiserated about the vanishing network perimeter. In the old days, the main concern was the growing number of partners, contractors, suppliers, customers and other "trusted outsiders" who needed access to our private networks. In response, corporations reexamined domain structures and deployed stronger authentication, access control and authorization technologies--all in the name of enlarging the corporate "circle of trust." Today, the challenges facing the virtual enterprise have intensified. An explosion in mobile computing and Webified applications have placed a premium on back office connectivity to anyone, from anywhere, with any device. This dynamic environment challenges conventional notions of network security: With the growing need for business users to access the Internet from inside the private network, the protections we once associated with security--firewalls, bastion hosts, DMZs--are no longer effective. The actions of individual users and the growing reliance on various services tunneled ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside


More Premium Content Accessible For Free