PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
March 2003

Security for the virtual enterprise

For almost a decade, security professionals have commiserated about the vanishing network perimeter. In the old days, the main concern was the growing number of partners, contractors, suppliers, customers and other "trusted outsiders" who needed access to our private networks. In response, corporations reexamined domain structures and deployed stronger authentication, access control and authorization technologies--all in the name of enlarging the corporate "circle of trust." Today, the challenges facing the virtual enterprise have intensified. An explosion in mobile computing and Webified applications have placed a premium on back office connectivity to anyone, from anywhere, with any device. This dynamic environment challenges conventional notions of network security: With the growing need for business users to access the Internet from inside the private network, the protections we once associated with security--firewalls, bastion hosts, DMZs--are no longer effective. The actions of individual users and the growing reliance on ...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

Columns in this issue

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

  • CIO Trends #6: Nordics

    In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to ...

  • CIO Trends #6: Middle East

    In this e-guide we look at the role of information technology as the Arabian Gulf commits billions of dollars to building more ...

  • CIO Trends #6: Benelux

    In this e-guide, read about the Netherlands' coalition government's four year plan which includes the term 'cyber' no fewer than ...

-ADS BY GOOGLE

Close