home.aspx
 
. https://www.accellion.com/blog/achieve-data-security-with-strong-internal-and-external-perimeters/
blog article
ACHIEVE DATA SECURITY WITH STRONG INTERNAL AND EXTERNAL PERIMETERS
Securing your organization’s most sensitive content is analogous to securing a busy office building. If you’re in charge of security in an office building, you must protect your tenants amid a constant flux of employees and visitors. You must keep the building, its employees, and their physical assets safe, but you can’t lock everyone out. You also can’t monitor every person, every moment. You can, however, protect the entrances and exits to establish a secure external perimeter. And, you can lock the doors to your valuables to establish a secure internal perimeter. You can also shrink the overall threat surface by reducing the number of doors. User apps, such as email, are the entrances and exits for files entering and leaving your organization. Enterprise apps and file stores, especially those where you keep sensitive content, are the doorways to your valuables. To protect your intellectual property, you must consolidate and secure these checkpoints. Restrict and secure the number of ways users can exchange files externally. And, restrict and secure the number of content repositories where valuable files are stored internally. READ MORE