E-Handbook: Better security through software-defined perimeter know-how Article 1 of 4

Software-defined perimeter architecture gets exclusive

As network attacks morph, so too must network security strategies. While traditional network architectures and technologies might detain some types of attacks, enterprises shouldn't wait to find out if their networks can withstand more sophisticated assaults.

A number of factors contribute to the need for bolstered network security. Denial-of-service attacks, data breaches, stolen credentials and insider threats culminate to cause a stress-induced headache for network and security teams. Further, an overwhelming number of IoT devices now require network access, making it essential for teams to secure their network perimeters and fine-tune authentication policies. Software-defined perimeter (SDP) architecture can help address these concerns.

A software-defined perimeter examines each endpoint for credentials and authorization before allowing it to access the network. Endpoints that receive permission to enter the network can then access the network resources and applications they're authorized to use. Further, SDP makes the network invisible to anyone outside of it.

Think of SDP as a buff bouncer at an exclusive club that is shrouded in mystery. This bouncer questions each potential patron for a unique secret password before permitting entrance into the club. Once inside, attendees have access only to the events or resources they're authorized to attend or use.

While software-defined perimeter architecture might not be as intriguing as an exclusive VIP club, it could prove to be a vital strategy to keep enterprises secure -- and exclusive -- where it counts. This guide to SDP provides the information you need to know about the technology, how it's evolving and its effect on traditional security approaches.

Unified Communications
Mobile Computing
Data Center