dcsimg

Main » TERM » N »

Network Perimeter Definition & Meaning

A perimeter in is an organization's boundary between its own and the outside networks that neighbor it. For example, one of a company's network perimeters might be the line between its private network and the , through which online users access their and portals. A border , which sits between a business's router and a user's router, is part of the business's last defense. It observes and filters some of the network .

A in a network perimeter performs a large amount of filtering and controlling Internet traffic into a private network. Firewalls look for suspicious activity and unusual requests, observe as they pass through the network, and may halt certain traffic if configured to do so. Users can configure their organization's firewall to limit certain traffic to or block particular requests.

Network perimeters perform and as well. Detection observes patterns in network traffic and sends alerts to administrators if anything appears suspicious or if the witnesses an attack. Intrusion prevention is usually software installed into the system. Based on the network regulations configured within the software, intrusion prevention can prevent network requests, block traffic, and halt attacks.

The decline of network perimeters

The solid line of a network perimeter that surrounds an entire company's network has faded with the widespread adoption of and the . Networks now require different protocols and software to protect the that passes across them. cross multi-cloud environments because businesses need greater flexibility for their ; employees access those from multiple devices around the world. Edge computing on local servers requires security to be localized as well, rather than being concentrated in one giant . Some security providers have begun implementing secure access service edge (SASE) technologies to secure the edge more thoroughly. The concept of a network perimeter is much less definable and visible than it once was.

The increase in remote work also requires businesses to monitor their network traffic more carefully. helps them to better manage who is accessing the network. Network control now goes far beyond just securing a perimeter.










LATEST ARTICLES
Texting & Chat Abbreviations

From A3 to ZZZ we list 1,559 text message and online chat abbreviations to help you translate and understand today's texting lingo. Includes Top... Read More »

Huge List of Computer Certifications

Have you heard about a computer certification program but can't figure out if it's right for you? Use this handy list to help you decide. Read More »

STUDY GUIDES
Computer Architecture Study Guide

Computer architecture provides an introduction to system design basics for most computer science students. Read More »

Network Fundamentals Study Guide

Networking fundamentals teaches the building blocks of modern network design. Learn different types of networks, concepts, architecture and... Read More »

The Five Generations of Computers

Learn about each of the five generations of computers and major technology developments that have led to the computing devices that we use... Read More »