ISSUES WITH PERIMETER BASED NETWORK SECURITY AND A BETTER MODEL TO RESOLVE THEM
European Journal of Molecular & Clinical Medicine,
2020, Volume 7, Issue 9, Pages 2437-2444
AbstractNetwork firewalls are becoming irrelevant, neither can we be relied upon the perimeter networks nor can they be trusted. With adoption of bring your own device and convey your own cloud, we must evolve our defences to the devices and therefore the identities. ZTA is a response to enterprise network trends that include remote users, devices and cloud-based assets which are not situated within an enterprise-owned network boundary. In this paper we will be understanding how the security state and the trustworthiness contributes to overall security pose, considerations for automated access to resources via device also the identity conditions and the way to implement these conditions to the road of business SaaS apps or on-premises web apps.
- Article View: 140
- PDF Download: 200