Security School

Get started Bring yourself up to speed with our introductory content.

Network perimeter security in a perimeterless world

The days of the enterprise network perimeter are over. This Security School explains the new reality and how network perimeterless security will work.

Introduction

With the rise in use of cloud and bring your own devices, the concept of the enterprise network perimeter is changing. In this Security School, with Johna Till Johnson, CEO and founder of Nemertes Research, learn about the pressures transforming the enterprise network perimeter and the new perimeterless network, and how to adapt your strategy for network perimeter security.

Watch the video, listen to the podcast, read the tech tip then take the quiz to see how much you have learned about securing the network perimeter. Passing the quiz earns you one CPE credit from (ISC)².

Take the quiz to check your knowledge of the new perimeterless network.

View our Security School Course Catalog to view more lessons eligible for CPE credits.

1Learning Links-

Network perimeter security

The concept of "inside" and "outside" an enterprise network perimeter is dated. Expert Johna Johnson explores how network perimeter security must change to deal with increasingly porous borders, cloud, BYOD and other network developments.

Video

Adjusting your network perimeter security

In this video, Johnson explains why the network perimeter security model is obsolete and reviews the problems of securing a perimeterless network. Continue Reading

Tip

Ensuring network perimeter security in a perimeterless age

Network perimeter security increasingly demands infosec pros take a perimeterless approach. Learn how to develop a new network security architecture and create a security toolkit for the perimeterless age. Continue Reading

Podcast

Top five tips for perimeterless network perimeter security

The enterprise perimeter is shifting and, for some, disappearing. Listen as Johnson outlines her top five tips for ensuring network perimeter security in the coming perimeterless age. Continue Reading

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close