Network designs that expose services and accept unsolicited connections present too much risk. Not meant for a complex and interconnected world, they're now obsolete. Security leaders can reduce risks using software-defined perimeters and other techniques that isolate applications from the internet.
- Benefits and Uses
- Evaluation Factors
- Service Isolation Alternatives
- Representative Providers
Gartner Recommended Reading