Star 0

Abstract

The relatively new paradigm of data and application security creates new challenges. Historically, securing the network perimeter provided enterprises with confidence that a high enough wall between themselves and the bad guys was enough to secure business critical information. The dissolution of the perimeter means organizations need to re-define their approach to securing information assets.