For years the perimeter has been the focal point of security technology. What was once routers with access control lists designed to block traffic founded on basic characteristics has evolved into a myriad of sophisticated devices inspecting every detail of communications. However, successful attacks are on the rise, with increasing impact on organizations. Although perimeter technology appears to have evolved significantly, it pales in comparison to the advancements in tactics and tools and the cleverness of today's threats. To add to the malaise, companies are seeking to fully leverage the Internet and new application development strategies in an effort to support the comprehensive information-sharing needs of the business.
展开▼