Controlling the network perimeter security of traditional organisations, focused on protecting the infrastructure rather than the data, and with limited mobile and remote access, has never been a trivial task.
Yet modern trends of workforce decentralisation and mobile access, reliance on third-party support, increasing consumption of cloud-based solutions and – last, but not least – growing attention on insider threats, are making the task harder, more expensive and, to some extent, insufficient.