The efforts to protect networks have twisted and turned in order to stay as close to the evolving perimeter as possible. The addition of mobile devices to the perimeter’s edge has increased the amount and volume of data at risk and therefore the tools needed to secure them.

Another way to view a perimeter is to say that none exists at all. “What we’ve found is that perimeter around the enterprise has evaporated,” said Bill Harrod, federal chief technology officer at MobileIron. Instead, Harrod points to the concept of zero trust to redefine the security perimeter at a granular level.

But as you’ll read in this Expert Edition: Federal Insights – Continuous Diagnostics and Mitigation, neither definition is turning out to be a problem for the Department of Homeland Security or its pilot program.

By providing your contact information to us, you agree: (i) to receive promotional and/or news alerts via email from Federal News Network and our third party partners, (ii) that we may share your information with our third party partners who provide products and services that may be of interest to you and (iii) that you are not located within the European Economic Area.

Please register using the form on this page.
Have questions or need help? Visit our Q&A page for answers to common questions or to reach a member of our team.

By providing your contact information to us, you agree: (i) to receive promotional and/or news alerts via email from Federal News Network and our third party partners, (ii) that we may share your information with our third party partners who provide products and services that may be of interest to you and (iii) that you are not located within the European Economic Area.