Vulnerabilities are always there, but new technologies may create additional weaknesses, if not addressed properly. Security has become even more critical in the mobile and cloud age today. For example: virtual machines (VMs) cannot be handled by traditional security; offline VMs may contain outdated patches when returning back online. Malicious attackers are more organized than before and therefore posting greater risks to organizations. Finally most customers have realized that there is no longer a clear distinction between “internal” and “external”, from a security perspective. Security controls and protection are needed throughout the data center.
The way users access information is also shifting. In the past, data and applications were housed on premises, and users were also generally on premises. Today, many organizations tap into talent pools all around the world. Workers might be full-time remote employees or contractors. Applications might be hosted off site or even in the cloud. But traditional IT still treats these crucial resources as internal entities. With Cisco Borderless Networks, IT can unify its approach to securely delivering applications to users in a highly distributed environment. The crucial element to scaling secure access is a policy-based architecture that allows IT to implement centralized access controls with enforcement throughout the network, from server to infrastructure, to client. This way, secure access is enabled anywhere with any device.