What is a Software Defined Perimeter?

Evoz Tech

Not so long ago, in order to secure their sensitive data and other IT assets, businesses would strive to develop a network security architecture that would cut off their internal network from the outside world.  To achieve this, they would often use a firewall (opens in new tab) to block outsiders while allowing insiders to come in and out of the network.

However, this strategy had one fatal flaw, and that is the assumption that all cyber threats are lurking from the outside while everyone that is allowed access to the network can be trusted. This becomes even more true with the rise of cloud computing and the explosion of remote work, meaning that more and more of the company’s workers and resources are coming in from outside of the traditional perimeter.


Next Post

What counts as 'malware'? AWS clarifies its definition

We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 – 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today! Amazon Web Services had strong words this week about research published on a new strain of malware, which was […]