Securing the Hyper-Extended Network

Is there anything left of the traditional network perimeter? Should security pros still walk the battlements of their network perimeters? If you listen to the security prognosticators, the perimeter is gone and everything—every piece of gear, application and line connecting them—must be hardened. In the olden days of infosecurity (about five years ago), the standard […]

Written By: Lawrence Walsh
Jun 11, 2009
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Is there anything left of the traditional network perimeter? Should security pros still walk the battlements of their network perimeters? If you listen to the security prognosticators, the perimeter is gone and everything—every piece of gear, application and line connecting them—must be hardened.

In the olden days of infosecurity (about five years ago), the standard paradigm for describing security infrastructure and schemas were the castle or egg analogy: you build a strong exterior to prevent intrusions and the interior was assumed trusted. What happens if you had a subnet that required higher levels of security? You’d simply section it off with a firewall and intrusion detection systems; essentially building a wall within a wall.

That worked well when you had a static infrastructure and workforce. But then enterprises had to get mobile and allow partners and customers to access internal resources. Security pros started talking about the “dissolving perimeter,” by which they actually meant a porous perimeter in that they had multiple entry points for trusted, semi-trusted and untrusted users to enter the network and gain access to resources. The porous perimeter gave rise to network access control, intrusion prevention systems and SSL VPNs.

But the perimeter is no longer porous; it’s completely gone. Whether we call it perimeterless networks, “borderless networks” as Cisco calls it, or “the hyper-extended enterprise” as RSA calls it, the situation remains the same: as applications and infrastructure moves into the cloud or becomes a cloud, the need for hardening every piece of the infrastructure—application, hardware and delivery channels—is paramount.

>> Click here to read the full blog post

Recommended for you...

Concentric AI Adds Integrations to Data Governance Platform

Concentric AI adds Wiz, Salesforce, and GitHub integrations to boost Semantic Intelligence platform’s AI-driven data governance and security capabilities.

Jordan Smith
Aug 15, 2025
Brivo Launching New Solution to Boost Security Suite

Brivo and Envoy partner to unify access control & visitor management, delivering scalable, compliant, and secure workplace experiences.

Jordan Smith
Aug 13, 2025
GitHub CEO Steps Down as Microsoft Tightens AI Integration

GitHub CEO Thomas Dohmke to step down in 2025 as Microsoft moves platform into CoreAI, deepening its role in the company’s AI development strategy.

Allison Francis
Aug 13, 2025
Backblaze CEO on GTM Strategy & AI Demand on M&E Datasets

Backblaze CEO on record growth, AI and M&E wins, and how new products and partnerships are driving enterprise cloud storage adoption.

Jordan Smith
Aug 13, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.