This resource is no longer available

Cover Image


In earlier times, if an enterprise presumed it had control over its network, and if it had few external connections or communication, it was feasible that the connections between operational computers probably were not an unacceptable risk. This required that any visitors to the enterprise with electronic devices had no ability to access the network, all users were properly managed, and that they abided by enterprise rules with regard to information management and security.  This is now a rare situation. Most enterprises use computers that are connect to the Internet, employing wireless communications internally, with the majority of their users connecting to services outside the enterprise perimeter, and partners and collaborators regularly connecting to the enterprise’s internal network with their own computing devices.  Additionally there is the emergence of Targeting Trojans and Worms that rely on our use of this old “Internal Trust” architecture to propagate.  In the de-perimeterised world, the use of inherently secure communications1 is essential (JFC#42) to provide protection from the insecure data transport environment. Inherently secure communications products, services, and protocols should act as fundamental building blocks for secure distributed systems, adaptable to the needs of applications while adhering to requirements for security, compliance and performance

Vendor:
TechTarget ComputerWeekly.com
Posted:
Feb 8, 2021
Published:
Nov 10, 2010
Format:
PDF
Type:
White Paper

This resource is no longer available.