{"id":32952,"date":"2017-12-17T20:00:00","date_gmt":"2017-12-17T20:00:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/4208217"},"modified":"2017-12-17T20:00:00","modified_gmt":"2017-12-17T20:00:00","slug":"how-access-management-protects-todays-no-perimeter-network-sdn-cloud-security","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/how-access-management-protects-todays-no-perimeter-network-sdn-cloud-security\/","title":{"rendered":"How Access Management Protects Today\u2019s No-Perimeter Network | #SDN #Cloud #Security"},"content":{"rendered":"<p>The rule of thumb for network security today is that there is no perimeter anymore. An outsider can easily become an insider once perimeter security is breached. Every day, attackers find new ways to breach enterprise perimeter security through ransomware, malware or phishing through social engineering.<br \/>\nThis is not to suggest that all is lost. Rather, organizations can defeat cybercriminals, in part, by better managing what has already been put in place. As an example of what can go wrong if that doesn\u2019t happen, consider the following story.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/4208217\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The rule of thumb for network security today is that there is no perimeter anymore. An outsider can easily become an insider once perimeter security is breached. Every day, attackers find new ways to breach enterprise perimeter security through ransomw&#8230;<\/p>\n","protected":false},"author":143,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-32952","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/32952","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/143"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=32952"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/32952\/revisions"}],"predecessor-version":[{"id":32953,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/32952\/revisions\/32953"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=32952"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=32952"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=32952"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}