For decades, protecting networks was entirely focused
on defining perimeters and setting up defense layers to
keep threats out. And for years, this approach served
businesses well, with finite exposure points and attack
vectors that were guarded with some investment and
adherence to established best practices and frameworks.
SonicWall Cyber Threat Report – Momentum of Perimeter-less Security
