Advisor

Castle or Submarine? The Inadequacy of Perimeter Defense

Posted December 6, 2005 | Leadership |

Most managers' first response, on being asked to secure their corporate networks, would probably be to install a firewall and force all incoming and outgoing traffic to pass through it. (Antivirus packages for all computers might come a close second these days.) Networks are becoming so complex and dynamic, however, that there are growing doubts as to whether perimeter defense can be trusted at all.

About The Author
Tom Welsh
Tom Welsh is a Senior Consultant with Cutter Consortium's Business & Enterprise Architecture practice. He is an independent consultant and analyst specializing in middleware, object technology, and software engineering. At Digital Equipment Corporation, Mr. Welsh was a hardware technician, software support specialist, corporate software developer, and senior technology consultant, before taking on the task of marketing Digital's OO software… Read More
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.