{"id":59720,"date":"2014-05-15T22:11:01","date_gmt":"2014-05-16T02:11:01","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2021-08-25T21:35:06","modified_gmt":"2021-08-26T01:35:06","slug":"is-the-perimeter-dead","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/is-the-perimeter-dead\/","title":{"rendered":"Is The Perimeter Dead?"},"content":{"rendered":"<p><a href=\"https:\/\/web.archive.org\/web\/20210302230434\/https:\/\/www.techrepublic.com\/blog\/10-things\/10-creative-ways-to-expand-your-small-company-it\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-102516\" title=\"Is The Perimeter Dead?\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/brick-wall.jpg?resize=125%2C89&#038;ssl=1\" alt=\"Is The Perimeter Dead?\" width=\"125\" height=\"89\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/brick-wall.jpg?resize=150%2C107&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/brick-wall.jpg?resize=75%2C53&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/brick-wall.jpg?resize=768%2C546&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/brick-wall.jpg?resize=1024%2C728&amp;ssl=1 1024w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/brick-wall.jpg?w=960&amp;ssl=1 960w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/brick-wall.jpg?w=1440&amp;ssl=1 1440w\" sizes=\"auto, (max-width: 125px) 100vw, 125px\" \/><\/a>Even while mobile, cloud, and software services are blurring the lines of corporate IT boundaries through <strong>deperimeterization<\/strong>, <a title=\"DarkReading\" href=\"https:\/\/www.darkreading.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>DarkReading<\/em><\/a> recently <a title=\"Is The Perimeter Really Dead?\" href=\"https:\/\/web.archive.org\/web\/20210624042801\/https:\/\/www.darkreading.com\/attacks-breaches\/is-the-perimeter-really-dead\/d\/d-id\/1140482?\" target=\"_blank\" rel=\"noopener noreferrer\">asked<\/a> out loud, if the perimeter is dead.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20191210030708\/http:\/\/www.cybertrackmarketing.com:80\/newpageSEO.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-102519\" title=\"it's very hard to define the perimeter of any organization\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/man_telescope-1-e1567357216789-126x150.jpg?resize=90%2C107&#038;ssl=1\" alt=\"it's very hard to define the perimeter of any organization\" width=\"90\" height=\"107\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/man_telescope-1-e1567357216789.jpg?resize=126%2C150&amp;ssl=1 126w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/man_telescope-1-e1567357216789.jpg?resize=63%2C75&amp;ssl=1 63w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/man_telescope-1-e1567357216789.jpg?w=190&amp;ssl=1 190w\" sizes=\"auto, (max-width: 90px) 100vw, 90px\" \/><\/a>There are those who believe enterprises are <strong>wasting their security budget on perimeter protection<\/strong>. In fact, <em><a href=\"https:\/\/www.fiercetelecom.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">FierceTelecom<\/a><\/em>\u00a0<a title=\"Firewall upgrades take precedence in IT spending; Core routers prepare to rebound Read more: Week in research: Firewall upgrades take precedence in IT spending; Core routers prepare to rebound \" href=\"https:\/\/web.archive.org\/web\/20150326002140\/http:\/\/www.fiercetelecom.com\/story\/week-research-firewall-upgrades-take-precedence-it-spending-core-routers-pr\/2013-08-09\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> that 57% of enterprises responding to a survey said they plan to spend $500,000 or more in 2014 to upgrade their firewalls to high-speed network interfaces. Security is the chief reason cited.<\/p>\n<h3>The perimeter is dead<\/h3>\n<p>It is no surprise that the answers varied according to the author. <strong>Hardliners have been hammering on the death of the perimeter<\/strong> for a long time now. &#8220;<em>Perimeter security is no longer relevant to enterprises. With the mobilization of the workforce, it&#8217;s very hard to define the perimeter of any organization because mobile-enabled employees are connecting to the network from all over the world on devices of their choosing,<\/em>&#8221; Thevi Sundaralingam, vice president of product management at <a title=\"Accellion\" href=\"https:\/\/www.accellion.com\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Accellion<\/a> told <em>DarkReading<\/em>. &#8220;<em>Next-gen security needs to focus keeping content safe, not on defining a network perimeter<\/em>.&#8221;<\/p>\n<h3>People are giving up on the perimeter<\/h3>\n<p>Then there are the <strong>cynical abandoners<\/strong>. &#8220;<em>In my opinion, <\/em><em><a title=\"network perimeter\" href=\"http:\/\/searchnetworking.techtarget.com\/definition\/network-perimeter\" target=\"_blank\" rel=\"noopener noreferrer\">perimeter security<\/a><\/em><em> is not dead &#8212; it just has been handled incorrectly for so long people are giving up<\/em>,&#8221; Alex Chaveriat, a consultant at <a title=\"SystemExpert\" href=\"https:\/\/web.archive.org\/web\/20230903233444\/https:\/\/systemexperts.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">SystemExpert<\/a> told the blog.<\/p>\n<p><a href=\"https:\/\/davidt0exa516.wordpress.com\/2016\/04\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-102523\" title=\"Network perimeter\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/network_perimeter.jpg?resize=135%2C90&#038;ssl=1\" alt=\"Network perimeter\" width=\"135\" height=\"90\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/network_perimeter.jpg?resize=150%2C100&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/network_perimeter.jpg?resize=75%2C50&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/network_perimeter.jpg?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 135px) 100vw, 135px\" \/><\/a>But others believe perimeter protection still has <strong>plenty of relevance<\/strong> for enterprise IT, even if it means rethinking the role of the perimeter and how these defenses are deployed. <a title=\"Corey Nachreiner\" href=\"https:\/\/www.linkedin.com\/pub\/corey-nachreiner\/1\/ba\/a71\" target=\"_blank\" rel=\"noopener noreferrer\">Corey Nachreiner<\/a>, director of security strategy for <a title=\"WatchGuard\" href=\"https:\/\/www.watchguard.com\" target=\"_blank\" rel=\"homepage noopener noreferrer\">WatchGuard<\/a> (a firm that sells firewalls) believes the perimeter is different but still relevant.<\/p>\n<p style=\"padding-left: 30px; text-align: justify;\"><em>T<\/em><em>he perimeter will never die, it will just get more focused &#8230; Sure, our workforce is getter (sic) more mobile, which means we need to incorporate new security solutions. But let&#8217;s not fool ourselves. The perimeter will never go away.<\/em><\/p>\n<h3>The perimeter is different<\/h3>\n<p><a href=\"http:\/\/tipmra.com\/new_tipmra\/Speeding_ticket_lesson_1.htm\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-102525\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cop_oldtime.gif?resize=100%2C134&#038;ssl=1\" alt=\"\" width=\"100\" height=\"134\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cop_oldtime.gif?resize=112%2C150&amp;ssl=1 112w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cop_oldtime.gif?resize=56%2C75&amp;ssl=1 56w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/><\/a>WatchGuard&#8217;s Nachreiner believes that the new perimeter needs to focus on server infrastructure and data centers, and not endpoint users. He believes firms will have to work in a hybrid environment that bolsters the perimeter not replacing it. &#8220;J<em>ust because people are using mobile devices and <\/em><em>cloud services doesn&#8217;t mean they won&#8217;t still have local servers and assets behind a relatively static perimeter.<\/em>&#8221;<\/p>\n<p>Another argument for perimeter defenses, according to the author is <strong>network egress monitoring<\/strong>. <a title=\" Michael Patterson, CEO of Plixer International\" href=\"https:\/\/www.linkedin.com\/pub\/michael-patterson\/5\/65b\/504\" target=\"_blank\" rel=\"noopener noreferrer\">Michael Patterson<\/a>, CEO of <a title=\"Plixer International\" href=\"http:\/\/www.plixer.com\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Plixer International<\/a> told the author that egress visibility is crucial to pinpoint large-scale breaches.<\/p>\n<p style=\"padding-left: 30px; text-align: justify;\"><em>Ultimately, the bad guys need to pass through the perimeter in order to complete the exfiltration of the data they are trying to steal &#8230; Monitoring behaviors is playing a significant role in this area as is the reputation of the site being connected to.\u00a0<\/em><\/p>\n<h3>The perimeter is growing<\/h3>\n<p><a href=\"https:\/\/iconnectdots.com\/2007\/06\/choosy-thieves.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-102537\" title=\"exfiltration of data\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_theft-1.png?resize=74%2C100&#038;ssl=1\" alt=\"exfiltration of data\" width=\"74\" height=\"100\" \/><\/a>CEO Patterson also explains that perimeter defense doesn&#8217;t necessarily have to be placed at the edge. He told <em>DarkReading<\/em> it may have more relevance inside the network to watch and block threats within the organization. It&#8217;s for this reason that <a title=\"Mike Lloyd, CTO of RedSeal Networks\" href=\"https:\/\/www.linkedin.com\/pub\/mike-lloyd\/0\/a0\/587\" target=\"_blank\" rel=\"noopener noreferrer\">Mike Lloyd, CTO<\/a> of <a title=\"RedSeal Networks\" href=\"http:\/\/www.redsealnetworks.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">RedSeal Networks<\/a>, says that rather than dying, the perimeter has actually grown in recent years. In the article he says;<\/p>\n<p style=\"padding-left: 30px; text-align: justify;\"><em>Companies have more and more perimeters that are getting smaller and smaller &#8230; Regulation drives it: PCI demands internal &#8220;zones&#8221; of segregation. <a title=\"Bring your own device\" href=\"http:\/\/en.wikipedia.org\/wiki\/Bring_your_own_device\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">BYOD<\/a> drives it: Once you let zany uncontrolled endpoint devices onto your network, you have to build zones to keep them away from internal assets. Security drives it: We&#8217;ve talked about defense in-depth for years, but people are finally doing it.<\/em><\/p>\n<p>As a result, RedSeal&#8217;s Lloyd says, security practitioners, have more opportunities for controls. This, though, can be a blessing and a curse. The downside is complexity, more controls in more places &#8230; The aspirin for that headache is automation. Make sure that all the enclaves you designed are actually set up and maintained properly as change happens.<\/p>\n<p><strong><em>rb-<\/em><\/strong><br \/>\n<em>The last time I\u00a0re-designed a network, we put a <a title=\"CheckPoint\" href=\"https:\/\/www.checkpoint.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Checkpoint<\/a>\u00a0(<a title=\"NASDAQ | CHKP\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-CHKP\/\" target=\"_blank\" rel=\"noopener noreferrer\">CHKP<\/a>) firewall in front the of server segment. We dropped it in, in transparent mode to collect the who, what, when, and why of people accessing data you should have heard the howls of protest. <\/em><\/p>\n<p><em>Despite naysayers, many security experts believe perimeter defenses have relevance when deployed as a part of defense-in-depth.<\/em><\/p>\n<p><strong>Related articles<\/strong><\/p>\n<ul>\n<li><a href=\"http:\/\/blogs.cisco.com\/security\/didata-series-2-mobility-policy-the-mobile-endpoint-is-the-new-perimeter\/\" target=\"_blank\" rel=\"noopener noreferrer\">Dimension Data Series #2 \u2013 Mobility Policy: The Mobile Endpoint is the New Perimeter<\/a> (blogs.cisco.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p style=\"text-align: left;\"><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mobile, Cloud computing ,and Software services are blurring the old corporate perimeter so firewalls are growing in importance not dying.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2292,2105,1242,2107,813,2108,2106,4,245],"class_list":["post-59720","post","type-post","status-publish","format-standard","hentry","category-security","tag-2292","tag-accellion","tag-byod","tag-firewall","tag-mobile-device","tag-perimeter","tag-plixer-international","tag-security","tag-watchguard"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/59720","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=59720"}],"version-history":[{"count":20,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/59720\/revisions"}],"predecessor-version":[{"id":132114,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/59720\/revisions\/132114"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=59720"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=59720"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=59720"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}