Best Practices for Securing a Boundaryless Cloud Perimeter


Enterprise cybersecurity historically focused on securing the fixed perimeter. Gateways and firewalls blocked bad actors and traffic from entering the organization. The rise of public cloud services and connectivity has dissolved the traditional perimeter.

The gateway devices are more commonly deployed in public cloud infrastructure and the instruction set on those systems has become more granular and intelligent to keep pace with advancing threats.

In this discussion, leading cybersecurity experts John Jacobs, Field CISO, Fortinet Technology Vertical, and Holger Schulze, Founder and CEO of Cybersecurity Insiders will cover the importance of three elements in practical application:

• Effective design, and guidelines to consider for the new landscape

• Cloud-native security tools available

• Continuous application, measurement and adjustment of applied policies

More Popular Resources