Online ISSN: 2515-8260

ISSUES WITH PERIMETER BASED NETWORK SECURITY AND A BETTER MODEL TO RESOLVE THEM

Main Article Content

Bharatha Sreeja G1 , Mubeen Begum Saleem2 , Venkata Sravya3 , Divya K4 , Jayashree R

Abstract

Network firewalls are becoming irrelevant, neither can we be relied upon the perimeter networks nor can they be trusted. With adoption of bring your own device and convey your own cloud, we must evolve our defences to the devices and therefore the identities. ZTA is a response to enterprise network trends that include remote users, devices and cloud-based assets which are not situated within an enterprise-owned network boundary. In this paper we will be understanding how the security state and the trustworthiness contributes to overall security pose, considerations for automated access to resources via device also the identity conditions and the way to implement these conditions to the road of business SaaS apps or on-premises web apps.

Article Details