There is a shift from focusing on north-south traffic – where information enters or exits the data centre – to east-west instead, says Infoblox's Sameh Ahmed.
When an organisation’s network perimeters shift, how difficult is it to combat malicious threats and remove the architecture vulnerabilities that often sit with the end-user?