Abstract :
The enterprise perimeter has exhibited gradual trust degradation owing to a succession of connectivity decisions involving Web, email, virtual private networking, exceptions, and mobile networks as well as a succession of threats including malware and advanced persistent threats (APTs). The author proposes restoring trust to the enterprise by focusing protection strategies on a set of prioritized assets. The protections center on three zones: a client zone, a network zone with network-based carrier protection services, and a cloud zone with third-party attested security heavily indexed toward identity and access management services. The resultant enterprise network is more resilient to leakage attacks such as APTs.
Keywords :
Internet; client-server systems; cloud computing; computer network security; invasive software; mobile computing; trusted computing; virtual private networks; APT; access management services; advanced persistent threats; client zone; connectivity decision; email; enterprise network; enterprise perimeter; malware; mobile networks; mobility-enabled secure cloud; network zone; network-based carrier protection services; protection center; protection strategies; third-party attested security; trust degradation; virtual private networking; Cloud computing; Computer security; Malware; Mobile communication; Virtual private networks; advanced persistent threats; enterprise networks; enterprise perimeter; firewall; intrusion detection system; intrusion prevention system;