Perimeter and content security

Considered for several years as the necessary basis when a network is connected to the Internet, perimeter security has left the sphere of the simple firewall. Moreover, the evolution of Internet threats and the rapprochement of the professional and private spheres implies the control of the very flows.

Perimeter protection

Remote sites, mobile users, cloud computing but also internal wifi networks, have redefined the scope of the company. The increasing permeability of private and public spaces in the IS now implies an evolution of the firewall concept.

Flow control

While perimeter protection and client workstations, combined with an authentication policy, make it possible to secure access to information systems, the management of internal and outgoing flows, to name just two, remains a critical point in risk management.