article thumbnail

Top Five Risks of Perimeter Firewalls and the One Way to Overcome Them All

Tech Republic Security

Firewalls have been an integral part of the enterprise network architecture. But with the shift to digital business models the once-sturdy firewall has gone from a security staple to a security risk. Read more to learn the five major risks brought on by legacy firewalls in a world of cloud and mobile.

article thumbnail

The Cloud – Gateway to Enterprise Mobility

Eric D. Brown

The world of mobile ten years ago was one that was mobile, but wasn’t. The security issues that existed were fairly minor. Companies setup virtual private networks (VPN’s) to allow access to the company systems from outside the firewall. Access via blackberry devices were fairly secure and straightforward.

Mobile 140
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Embrace DBaaS to Speed Up Mobile App Development

CTOvision

As enterprises work to rapidly embrace the mobile revolution, both for their workforce and to engage more deeply with their customers, the pressure is on for IT to support the tools needed by their application developers. There’s no denying the massive growth in mobile applications within the enterprise. By Chip Childers.

Mobile 264
article thumbnail

Overcoming the Equation: Security = Friction

CTOvision

Why does security have to be so onerous? Is this password secure enough: Mxyzptlk? Now that’s secure – good luck remembering it! We’ve migrated to a userid-password society; as we’ve added layers of security, we password-protect each layer: PC (and now device), network, enclave, application, database, and storage (encryption).

Security 249
article thumbnail

Zero trust and why it matters to the Apple enterprise

Computerworld Vertical IT

Once upon a time, digital business sat inside the security perimeter. Devices were kept in offices, shared the same network, and were protected by antivirus software, firewalls, and software updates. With mobility, this changed. To read this article in full, please click here

article thumbnail

Zero trust and why it matters to the Apple enterprise

ComputerWorld IT Management

Once upon a time, digital business sat inside the security perimeter. Devices were kept in offices, shared the same network, and were protected by antivirus software, firewalls, and software updates. With mobility, this changed. To read this article in full, please click here

article thumbnail

How Google reinvented security and eliminated the need for firewalls

Network World

It had the typical defensive security posture based on the concept that the enterprise is your castle and security involves building moats and walls to protect the perimeter. Over time, however, that perimeter developed holes as Google’s increasingly mobile workforce, scattered around the world, demanded access to the network.