Why securing the network perimeter is a challenge
Gaining visibility into an organization's exposed network and application attack surface is hard. Even knowing where the assets are is difficult; there is rarely an asset inventory or one that's up to date. Knowing what's running and where, and how the services are configured, is a moving target. There is never enough time to do a good-enough job and finding experts in security is difficult. On top of that, technology changes so quickly, changes are constant, and operations are more distributed than ever. As a result, there is a lack of oversight, misconfiguration is rife, and there are frequent outages, as well as unknown security exposures.