LATEST INTELLIGENCE allows enterprises to optimally tailor their security architecture to their needs .
Network Security History and Trends
The history of network security has largely seen network security vendors introducing new , functionspecific and increasingly complex security solution elements to implement a largely passive security posture : network security moved from first-generation stateless firewalls to stateful firewalls , then to nextgeneration firewalls that added increasing levels of application- and web-awareness . We shall explore all these existing as well as emerging security elements in the following chapter .
The key in understanding network security lies in also understanding the evolution of enterprise architecture over the last 20 years . Initially , as the internet started to transform enterprises world-wide , a medieval castle approach to security was enough . The traditional enterprise network simply had to protect centralized enterprise assets that all were on-premise , such as servers , on-premise apps and data as well as users and their endpoints . And even as cloud-adoption started to take off , for a long time the enterprise network security posture held on to the centralized model : traffic from remote offices and remote users was backhauled in its entirety to HQ or the main DC ( see Figure 1 ), to t hen be broken out into the Internet if necessary . While this provided a convenient centralized model to security decisions , this model was not enough to combat ever more elaborate threats and furthermore started to incur severe performance problems as cloud resource usage ( SaaS , IaaS , PaaS , UCaaS etc .) invariably grew , especially for remote offices and users . The resulting penalty in latency , jitter , and packet loss especially impacted remote offices and users . In addition , the model often resulted in the need for ever increasing and costly MPLS bandwidth , particularly for real-time collaboration applications . p