Is there a reasonable technology solution for enterprise security? The overwhelming majority of corporate enterprises employ a perimeter security model: hard exterior, soft interior. Typical perimeter ...
So the debate is whether to use encrypted tunnels or perimeter-based controls for security -- in other words, whether it is better to place more or less emphasis on the network perimeter? David ...