VPNs and Extruded Networks
Hosts outside the firewall trusted, at least partly
Personal Firewalls
Split-Tunnel
Our perimeter is distributed over many devices
We may not own these hosts, or control them at all
Previous slide
Next slide
Back to first slide
View graphic version