Loading [MathJax]/extensions/MathMenu.js
From the Enterprise Perimeter to a Mobility-Enabled Secure Cloud | IEEE Journals & Magazine | IEEE Xplore

From the Enterprise Perimeter to a Mobility-Enabled Secure Cloud


Abstract:

The enterprise perimeter has exhibited gradual trust degradation owing to a succession of connectivity decisions involving Web, email, virtual private networking, excepti...Show More

Abstract:

The enterprise perimeter has exhibited gradual trust degradation owing to a succession of connectivity decisions involving Web, email, virtual private networking, exceptions, and mobile networks as well as a succession of threats including malware and advanced persistent threats (APTs). The author proposes restoring trust to the enterprise by focusing protection strategies on a set of prioritized assets. The protections center on three zones: a client zone, a network zone with network-based carrier protection services, and a cloud zone with third-party attested security heavily indexed toward identity and access management services. The resultant enterprise network is more resilient to leakage attacks such as APTs.
Published in: IEEE Security & Privacy ( Volume: 11, Issue: 1, Jan.-Feb. 2013)
Page(s): 23 - 31
Date of Publication: 01 February 2013

ISSN Information:


Contact IEEE to Subscribe

References

References is not available for this document.