Increased app use, multiple clouds, and edge computing are causing IT perimeters to grow, which increases complexity, reduces visibility, and makes security a lot more difficult.
Cyber criminals are exploiting these security gaps.
Many security teams spend too much time defending the
data
center—the old perimeter.
Meanwhile, 80% of breaches are via weak or stolen passwords,
and the majority of malware arrives via web or email.
Attackers
are targeting the weakest links, which are users
and
applications—the new perimeter.