In Lieu of a Perimeter, Put Security at the Edge
The rise of cloud, mobility and related applications effectively have undermined the concept of perimeter-based security. That is why the Trusted Internet Connection (TIC) 3.0 addresses the need to address security when users, applications and data reside outside the perimeter.