BeyondCorp: A New Approach to Enterprise Security
;login:, Vol. 39, No. 6(2014), pp. 6-11
Abstract
Virtually every company today uses firewalls to enforce perimeter security. However, this security model is problematic because, when that perimeter is breached, an attacker has relatively easy access to a company’s privileged intranet. As companies adopt mobile and cloud technologies, the perimeter is becoming increasingly difficult to enforce. Google is taking a different approach to network security. We are removing the requirement for a privil...
Read more at research.google