The network perimeter has disappeared for many reasons including some common buzzwords these days such as BYOD, the cloud and more. But what often is overlooked is that the majority of firewall breaches (the traditional first line of defense) are actually caused by improper configurations (see our “horror stories” blog series where we highlighted some real-life firewall misconfiguration examples).
Employing new technologies that provide more granular control is a good step to mitigating this risk, but without maintaining the defined firewall configurations over time, these security devices cannot provide the protection they should. Next week, we’re joining our partner McAfee on the webcast “Regaining Control of the Network Perimeter” where we’ll examine this challenge, offer recommendations to improve firewall policy management and reduce risk, and review a real-life case study. See you on Tuesday!
Receive notifications of new posts by email.