The size of the network has gradually changed over the past decade or so – effectively since the cloud was ubiquitous – but in the past two years it has changed beyond recognition.
In many ways, the company’s network perimeter is now fragmented into pieces that encompass any home or remote office network, any public cloud, and even any cloud service used in day-to-day business. As IT departments know, with an average number of remote services in an average company of around 1,200, the IT perimeter is now effectively resolved.
To better protect users across the enterprise, security teams are rethinking the way cybersecurity and security are implemented. The modern approach is to establish zero trust network connectivity with all resources, be it in the cloud or the company’s data centers.
The first steps were to position hardware security devices to mediate connections at each edge location, and virtualized security solutions …