Reducing the Attack Surface
Conventional perimeter security solutions restrict access to services and data and require hardware. Certain users may not be authorized to access specific services, but those services still exist on the network, and the safeguards that protect them are visible and may be vulnerable.