Information-centric Security – Thinking Beyond Traditional Perimeter-based Security

Posted by Anand Kekre on April 30 2015

Over a period of time, companies have heavily invested into security products including firewalls, anti-spam and intrusion prevention/detection that protect the corporate network (call it, corporate perimeter). This approach to information security is not enough in today’s world of consumerization, mobility and BYOD where data is being increasingly used from devices that are outside the corporate perimeter. Hence the practice of protecting corporate data through network and perimeter-based security measures is now being seen as ineffective in the light of security breaches and company data leaks in the recent past. 

Read More

Topics: Mobility, Digital Rights Management (DRM), Information Security, Mobility (EMM), Thought Leadership

Free White Paper: 6 Essentials For 100% Secure Enterprise File Sharing

Subscribe To The Blog By Email

Blog Topics