White Paper

The Top Five Risks of Perimeter Firewalls and the One Way to Overcome Them All

The Top Five Risks of Perimeter Firewalls and the One Way to Overcome Them All

Pages 7 Pages

The Top Five Risks of Perimeter Firewalls and the One Way to Overcome Them All F I R E WA L L R I S K S / ZS C A L E R Firewalls have long been an integral part of the enterprise network architecture. But with the shift to digital business models, the once-sturdy firewall has gone from a security staple to a security risk. Here’s why. In a traditional perimeter-based security architecture that leverages firewalls and VPNs, security is constrained to the perimeter, or zone of trust. Any user or application inside the perimeter or trust zone is considered good, and those outside are considered bad. This worked well when most users and applications were inside the perimeter. Anyone outside the perimeter had to be brought onto the network by extending the perimeter to them. This was

Join for free to read