There was a time when a “Great Wall of China” approach to IT security was sufficient. Just focus your resources at the network perimeter to keep invaders out. As long as nobody leaves the kingdom, you’re good to go. Unfortunately, IT resources have jumped the wall, so to speak, thanks to the cloud and mobile.



