But, with so many in-line appliances and tools operating on the edge, you run the risk of oversubscription. Should this happen, the protection system you’ve built no longer provides its intended benefit – and this is where your data could bleed and become compromised.
As a Network World article puts it, “Many of the tools and configurations [involve] a performance tradeoff, and some can introduce security vulnerabilities. Even the ones that are supposed to be securing your network.”
For example, if you leverage intricate content filtering and packet parameters, the complexity often significantly slows your throughput.
Garland Technology recently created a SlideShare presentation that details the network edge and its devices, including the EdgeLens. Watch it now to help further your understanding of this critical network layer and protect your data. Also, use it to help educate your colleagues on this important piece of your network's infrastructure and protection.
If you want to learn more about the ins and outs of security necessities, download our latest white paper, Managing the Edge of the Network.