Remove Enterprise Remove Firewall Remove Mobile Remove Security
article thumbnail

Top Five Risks of Perimeter Firewalls and the One Way to Overcome Them All

Tech Republic Security

Firewalls have been an integral part of the enterprise network architecture. But with the shift to digital business models the once-sturdy firewall has gone from a security staple to a security risk. Read more to learn the five major risks brought on by legacy firewalls in a world of cloud and mobile.

article thumbnail

The Cloud – Gateway to Enterprise Mobility

Eric D. Brown

This post is brought to you by the Enterprise CIO Forum and HP’s Make It Matter. The world of mobile ten years ago was one that was mobile, but wasn’t. The security issues that existed were fairly minor. Companies setup virtual private networks (VPN’s) to allow access to the company systems from outside the firewall.

Mobile 140
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Zero trust and why it matters to the Apple enterprise

Computerworld Vertical IT

Once upon a time, digital business sat inside the security perimeter. Devices were kept in offices, shared the same network, and were protected by antivirus software, firewalls, and software updates. With mobility, this changed. To read this article in full, please click here

article thumbnail

Zero trust and why it matters to the Apple enterprise

ComputerWorld IT Management

Once upon a time, digital business sat inside the security perimeter. Devices were kept in offices, shared the same network, and were protected by antivirus software, firewalls, and software updates. With mobility, this changed. To read this article in full, please click here

article thumbnail

Embrace DBaaS to Speed Up Mobile App Development

CTOvision

As enterprises work to rapidly embrace the mobile revolution, both for their workforce and to engage more deeply with their customers, the pressure is on for IT to support the tools needed by their application developers. There’s no denying the massive growth in mobile applications within the enterprise.

Mobile 264
article thumbnail

How Google reinvented security and eliminated the need for firewalls

Network World

SAN FRANCISCO -- In some ways, Google is like every other large enterprise. It had the typical defensive security posture based on the concept that the enterprise is your castle and security involves building moats and walls to protect the perimeter. In other ways, Google is unlike any other company.

article thumbnail

Enhance Your Security Posture: Doing Four Things Can Reduce Unauthorized Penetrations by 85%

CTOvision

By Bob Gourley We often highlight the importance of applying security controls to your enterprise. As a review, they are: 20 Critical Security Controls – Version 4.1. Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers. Application Software Security.

Security 278