Enterprises and their users are facing a host of security challenges, from phishing attacks to risks from unsecured Wi-Fi. And now we’re even seeing Internet edge implementations add security risks.
Below I’ll discuss the two approaches for building a secured Internet infrastructure and discuss the best option for you and your users.
Internet Edge Infrastructure Design: Converged or Separate
Internet connectivity for most organizations follows a pretty standardized approach. Figure 1 (below) shows the most common topology.