Software-defined perimeter: Important initiative, ineffective name

(Source: CSO Online) Additionally, the source can be any type of device in any location, and the destination can be any type of application or service in any location, accommodating for mobility, BYOD, and cloud computing. SDP connections rely on strong authentication of users and devices and then enforce access policies based upon identity …