This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
From the Enterprise Perimeter to a Mobility-Enabled Secure Cloud
Jan.-Feb. 2013 (vol. 11 no. 1)
pp. 23-31
Edward G. Amoroso, AT&T Labs
The enterprise perimeter has exhibited gradual trust degradation owing to a succession of connectivity decisions involving Web, email, virtual private networking, exceptions, and mobile networks as well as a succession of threats including malware and advanced persistent threats (APTs). The author proposes restoring trust to the enterprise by focusing protection strategies on a set of prioritized assets. The protections center on three zones: a client zone, a network zone with network-based carrier protection services, and a cloud zone with third-party attested security heavily indexed toward identity and access management services. The resultant enterprise network is more resilient to leakage attacks such as APTs.
Index Terms:
Cloud computing,Computer security,Malware,Mobile communication,Virtual private networks,advanced persistent threats,enterprise perimeter,enterprise networks,firewall,intrusion detection system,intrusion prevention system
Citation:
Edward G. Amoroso, "From the Enterprise Perimeter to a Mobility-Enabled Secure Cloud," IEEE Security & Privacy, vol. 11, no. 1, pp. 23-31, Jan.-Feb. 2013, doi:10.1109/MSP.2013.8
Usage of this product signifies your acceptance of the Terms of Use.