Security News > 2020 > June > Why identity-based, distributed controls are better suited to address cloud-era threats
With more and more IT resources moving to the cloud and remote work becoming a ubiquitous business practice due to COVID-19, perimeter-based security is undeniably becoming a weak link, especially since attackers have repeatedly demonstrated they can bypass firewalls and spread laterally within enterprise networks.
The first has existed for several years and is now gaining real traction to address the security gap created by the disintegration of the network perimeter.
Adopt an Identity Provider: Everything is moving to the cloud - applications, security controls and identities.
Protect remote workstations: SASE can be used to provide always-on network security protection to remote workstations without requiring a VPN. These users can get the benefit of the security and visibility afforded from being "Behind the firewall" without having to perform an authentication action, without having their traffic backhauled across the Internet, and without the risk that a compromise of their devices can infect other corporate assets.
Cloud adoption and remote work trends have irrevocably changed the enterprise security landscape, making many traditional perimeter controls obsolete.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/HKyjaWnacfk/