{"id":56543,"date":"2022-08-23T09:12:55","date_gmt":"2022-08-23T01:12:55","guid":{"rendered":"https:\/\/version-2.com\/?p=56543"},"modified":"2022-09-29T17:41:17","modified_gmt":"2022-09-29T09:41:17","slug":"how-has-robotic-process-automation-revolutionized-routine-execution","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2022\/08\/how-has-robotic-process-automation-revolutionized-routine-execution\/","title":{"rendered":"How Has Robotic Process Automation Revolutionized Routine Execution?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"56543\" class=\"elementor elementor-56543\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9966c4 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9966c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;437ef7f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2884b38\" data-id=\"2884b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-980bf1e elementor-widget elementor-widget-text-editor\" data-id=\"980bf1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p align=\"center\"><img decoding=\"async\" src=\"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/08\/Network-Security-Perimeter-Why-Is-This-Concept-Obsolete.png\" alt=\"\" ><\/p>\n\n<p><span style=\"font-weight: 400\">For a long time, companies had <\/span><i><span style=\"font-weight: 400\">data centers<\/span><\/i><span style=\"font-weight: 400\"> as their IT infrastructures, which needed to be protected from external agents.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400\">Business-critical data was embedded in these allocations, including internal networks, client devices, Internet gateways, applications, and servers.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400\">To protect these assets, firewalls, antivirus programs, intrusion systems, and demilitarized zones were used, separating those who had access authorization from those who did not.<\/span><\/p>\n<p><span style=\"font-weight: 400\">In this type of structure, anyone could access most of the network, regardless of their need and the tasks they performed in the company.<\/span><\/p>\n<p><span style=\"font-weight: 400\">On the other hand, accessing it remotely was a major challenge due to the <\/span><b>Network Security Perimeter<\/b><span style=\"font-weight: 400\">.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400\">The digital transformation process, along with the migration of infrastructures to the cloud and the adoption of remote work models, has led companies to decentralize their infrastructures.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400\">One of the direct consequences of this movement was the development and adoption of Zero Trust-based models and micro-segmentation, since the <\/span><b>Network Security Perimeter<\/b><span style=\"font-weight: 400\"> has become inefficient. In this article, we will explore this subject. To facilitate your reading, we divided our text into topics:<\/span><\/p>\n\n<ul>\n<li><b>What Is a Network Security Perimeter<\/b><\/li>\n<li><b>Why Many Experts Believe the Network Security Perimeter has Become Outdated<\/b><\/li>\n<li><b>Three Changes that Contributed to Making the Network Security Perimeter Obsolete<\/b><\/li>\n<li><b>New Ways to Handle Network Security Today<\/b><\/li>\n<li><b>Internet of Things and the Network Security Perimeter<\/b><\/li>\n<li><b>About senhasegura<\/b><\/li>\n<li><b>Conclusion<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Read our content to the end and understand more about it!<\/span><\/p>\n\n<h2><b>What Is a Network Security Perimeter<\/b><\/h2>\n<p><span style=\"font-weight: 400\">The <\/span><b>Network Security Perimeter <\/b><span style=\"font-weight: 400\">refers to the model used in traditional networks to protect resources and data and prevent them from being accessed by external invaders.<\/span><\/p>\n<p><span style=\"font-weight: 400\">For this, intrusion detection and prevention systems and firewalls are used, among other security measures. There are three best practices when it comes to <\/span><b>Network Security Perimeter<\/b><span style=\"font-weight: 400\">, which are:<\/span><\/p>\n\n<ul>\n<li style=\"font-weight: 400\"><b>Passive Monitoring<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Some features can be used to promote passive monitoring by detecting vulnerabilities and identifying different devices connected to the network.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Passive monitoring allows one to locate desktops, remote servers, and routers, among others, and assess their configuration and operating system in order to find weaknesses that can be exploited by malicious agents. To do this, one must activate these features or schedule them manually.&nbsp;<\/span><\/p>\n\n<ul>\n<li style=\"font-weight: 400\"><b>Active Monitoring<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Active monitoring makes it possible to map an organization\u2019s private network and check it continuously, identifying irregular traffic, unknown IP, and data transmission, among other patterns.<\/span><\/p>\n<p><span style=\"font-weight: 400\">With active monitoring tools, one can keep employees in compliance with the organization\u2019s guidelines, without exposing the system to security failures due to malicious actions or misuse. They allow you to create logs and reports to audit network security in real-time.<\/span><\/p>\n\n<ul>\n<li style=\"font-weight: 400\"><b>Network Zoning<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Network zoning divides the areas of a network into secure, restricted, controlled, and uncontrolled zones. Its great benefit is to limit security breaches to the areas where they occurred, without affecting the others.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Each zone has different security policies and traffic can be restricted through firewalls, which leave the identity of the trusted network hidden from untrusted ones that are connected to the Internet.<\/span><\/p>\n<p><span style=\"font-weight: 400\">With the evolution of cloud computing, the <\/span><b>Network Security Perimeter<\/b><span style=\"font-weight: 400\"> has become insufficient to provide cybersecurity to organizations. In the next topic, we explain why.<\/span><\/p>\n<p><span style=\"font-weight: 400\"><\/span><\/p>\n<h2><b>Why Many Experts Believe the Network Security Perimeter has Become Outdated<\/b><\/h2>\n<p><span style=\"font-weight: 400\">The digital transformation has brought the possibility of accessing corporate resources from any environment, maintaining the productivity of employees who are in remote work or on a business trip.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400\">This can be very positive, as it ensures availability for customers, whose demands are constantly evolving.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400\">Adapting to digital transformation involves understanding that the security perimeter does not cover just the local network. Today, it is necessary to protect corporate resources accessed from external networks, such as hotels, cafes, or homes of employees and business partners.<\/span><\/p>\n<p><span style=\"font-weight: 400\">For this reason, experts believe the <\/span><b>Network Security Perimeter<\/b><span style=\"font-weight: 400\"> consists of a concept that has become insufficient and obsolete.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400\">This is because the traditional firewall used to consider the activities developed within a strong perimeter to be secure, and the services managed by public cloud providers extrapolate this delimitation and rely on mechanisms that require other security measures.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Digitally transforming a company requires modifying its security model, applying automated controls, detecting violations using the available signals, and applying the principle of least privilege. In addition, the actions performed by users must be constantly verified, regardless of where these users are located. We call this Zero Trust.&nbsp;<\/span><\/p>\n\n<h2><b>Three Changes that Contributed to Making the Network Security Perimeter Obsolete<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Some changes have contributed to making the <\/span><b>Network Security Perimeter<\/b><span style=\"font-weight: 400\"> an obsolete solution. Among them, we can highlight:<\/span><\/p>\n\n<ul>\n<li style=\"font-weight: 400\"><b>Covid-19<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">The Covid-19 pandemic has caused many organizations to adopt remote work and, as it seems, this type of work may remain.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This changed the way people work: those who settled in an office today access the resources they need from any device, anywhere.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400\">But even before the spread of the coronavirus, the work had already changed for many: although people worked not <\/span><i><span style=\"font-weight: 400\">only <\/span><\/i><span style=\"font-weight: 400\">at home, they <\/span><i><span style=\"font-weight: 400\">also<\/span><\/i><span style=\"font-weight: 400\"> worked at home.<\/span><\/p>\n\n<ul>\n<li style=\"font-weight: 400\"><b>VPNs<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">With the growth of remote work, VPNs were used by companies so that their employees could securely perform their tasks, even far from the office.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Today, they are still useful for enabling secure remote connections, but violations have already shown us that their security model is perimeter-based. That\u2019s why organizations are looking for easier and more secure resources.&nbsp;<\/span><\/p>\n\n<ul>\n<li style=\"font-weight: 400\"><b>Cloud Computing<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Cloud computing is part of the reality of most companies today. As a result, data and resources are no longer stored in network locations and are stored in an external cloud.<\/span><\/p>\n<p><span style=\"font-weight: 400\">In this way, your employees can access information available in the cloud environment from anywhere in the world, which provides much more dynamism to their activities.<\/span><\/p>\n<p><span style=\"font-weight: 400\">However, it is no longer possible to talk about <\/span><b>Network Security Perimeter<\/b><span style=\"font-weight: 400\">, or delimiting a certain area, since it dissolves in this context.&nbsp;<\/span><\/p>\n\n<h2><b>New Ways to Handle Network Security Today<\/b><\/h2>\n<p><span style=\"font-weight: 400\">After noting that the <\/span><b>Network Security Perimeter <\/b><span style=\"font-weight: 400\">has become insufficient, it is necessary to<\/span> <span style=\"font-weight: 400\">adhere to other ways of handling network security, and some of them are:<\/span><\/p>\n\n<ul>\n<li style=\"font-weight: 400\"><b>Zero Trust-based Models<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">One of the alternatives to the <\/span><b>Network Security Perimeter <\/b><span style=\"font-weight: 400\">is to migrate to a model based on zero trust, which assumes that one should never trust, but always verify.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Therefore, users and devices must be authenticated and constantly verified each time they access a program or resource through solutions such as SSO or multifactor authentication (MFA).<\/span><\/p>\n<p><span style=\"font-weight: 400\">Thus, users will have access only to the data and tools they need to perform their functions.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This mechanism promotes security because it not only protects the network against external invaders but also against insider threats. At the same time, it favors flexible access to organizational systems, which can be done from any environment.&nbsp;<\/span><\/p>\n\n<ul>\n<li style=\"font-weight: 400\"><b>Micro-segmentation<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Micro-segmentation enables the creation of secure areas for companies to segment workloads that must be protected in isolation.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400\">This feature is useful in environments with many assets, such as cloud deployments and data centers, but it is very complex to deploy it securely in large companies with numerous networks, cloud platforms, and firewalls.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400\">To be efficient, micro-segmentation needs to have visibility, something that many networks do not have. This is because engineers must know which devices are on the network to target them.&nbsp;<\/span><\/p>\n\n<ul>\n<li style=\"font-weight: 400\"><b>Software-defined Perimeter<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Created by the <\/span><i><span style=\"font-weight: 400\">Cloud Security Alliance<\/span><\/i><span style=\"font-weight: 400\"> (CSA), the software-defined perimeter (SDP) is a structure that controls access to resources based on user identity. Its function is to allow connection to applications, network systems, and services securely, hiding details of the infrastructure such as IP addresses and port numbers.<\/span><\/p>\n<p><span style=\"font-weight: 400\">In this model, a network device refuses connections from any other device or application that is unnecessary to perform a certain activity, preventing attackers from exploiting the network.&nbsp;<\/span><\/p>\n\n<h2><b>Internet of Things and the Network Security Perimeter<\/b><\/h2>\n<p><span style=\"font-weight: 400\">The<\/span> <span style=\"font-weight: 400\">Internet of Things (IoT) is characterized by making it possible to live in a hyper-connected world, in which everyday objects are connected to the Internet, working together with the minimum of human intervention.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Its evolution generates new vulnerabilities when it comes to information security, since not all people are used to adopting appropriate protection measures.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Preventing technological evolution is impossible, however, it is necessary to reflect that having everything connected anywhere makes the goal of the <\/span><b>Network Security Perimeter<\/b><span style=\"font-weight: 400\">unfeasible, requiring the adoption of layers of security that do not compromise the business.&nbsp;<\/span><\/p>\n\n<h2><b>About senhasegura<\/b><\/h2>\n<p><span style=\"font-weight: 400\">We, from <\/span><b>senhasegura<\/b><span style=\"font-weight: 400\">, are part of the MT4 Tecnologia group, created in 2001, to promote cybersecurity.<\/span><\/p>\n<p><span style=\"font-weight: 400\">We are present in 54 countries, providing our clients with control over privileged actions and data. In this way, we avoid the action of malicious users and data leaks.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400\">We understand that digital sovereignty is a right of all and this goal can only be achieved with applied technology.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400\">Therefore, we follow the life cycle of privileged access management, before, during, and after access, by using machine automation. Among our commitments, the following stand out:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ensure more efficiency and productivity for businesses, as we avoid interruptions due to expiration;<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Perform automatic audits on the use of privileges;<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Automatically audit privileged changes to detect abuses;<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ensure customer satisfaction;<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Perform successful deployments;<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Provide advanced <\/span><a href=\"https:\/\/senhasegura.com\/privileged-access-management-senhasegura\/\"><span style=\"font-weight: 400\">PAM<\/span><\/a><span style=\"font-weight: 400\"> capabilities;<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Reduce risks;<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Bring companies into compliance with audit criteria and standards such as PCI DSS, Sarbanes-Oxley, ISO 27001, and HIPAA.<\/span><\/li>\n<\/ul>\n\n<h2><b>Conclusion<\/b><\/h2>\n<p><span style=\"font-weight: 400\">By reading this article, you saw that:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><b>Network Security Perimeter<\/b><span style=\"font-weight: 400\"> consists of a model used in traditional networks to prevent data and resources from being accessed by external invaders;<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">There are three best practices when it comes to Network Security Perimeters, which are: passive monitoring, active monitoring, and network zoning.&nbsp;<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">This capability is not enough to protect corporate resources accessed from external environments by people linked to organizations;<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">It is a system that has become obsolete, due to the reduction in the use of VPNs, the Covid-19 pandemic and the wide adherence to remote work that it caused;<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Therefore, companies have adapted themselves through solutions such as Zero Trust-based models, micro-segmentation, and software-defined perimeter;<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">The Internet of Things also represents a challenge for the <\/span><b>Network Security Perimeter<\/b><span style=\"font-weight: 400\">, as it makes it possible to have everything connected anywhere.<\/span><\/li>\n<\/ul>\n\n<p><span style=\"font-weight: 400\">Did you like our article on <\/span><b>Network Security Perimeters<\/b><span style=\"font-weight: 400\">? Share it with someone who may also be interested in the topic.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7b53ad elementor-widget elementor-widget-shortcode\" data-id=\"a7b53ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18134\" class=\"elementor elementor-18134\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a909055 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"a909055\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e3c0d4\" data-id=\"4e3c0d4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10af45e elementor-widget elementor-widget-text-editor\" data-id=\"10af45e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Segura\u00ae <\/strong><br \/>Segura\u00ae strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>For a long time, companies had data centers as their IT [&hellip;]<\/p>\n","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[419,488,61],"tags":[420,489],"class_list":["post-56543","post","type-post","status-publish","format-standard","hentry","category-segura","category-488","category-press-release","tag-segura","tag-489"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Has Robotic Process Automation Revolutionized Routine Execution? - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/senhasegura.com\/network-security-perimeter-why-is-this-concept-obsolete\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Has Robotic Process Automation Revolutionized Routine Execution? - Version 2\" \/>\n<meta property=\"og:description\" content=\"For a long time, companies had data centers as their IT [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/senhasegura.com\/network-security-perimeter-why-is-this-concept-obsolete\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-23T01:12:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-29T09:41:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/08\/Network-Security-Perimeter-Why-Is-This-Concept-Obsolete.png\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/network-security-perimeter-why-is-this-concept-obsolete\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/08\\\/how-has-robotic-process-automation-revolutionized-routine-execution\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"How Has Robotic Process Automation Revolutionized Routine Execution?\",\"datePublished\":\"2022-08-23T01:12:55+00:00\",\"dateModified\":\"2022-09-29T09:41:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/08\\\/how-has-robotic-process-automation-revolutionized-routine-execution\\\/\"},\"wordCount\":1716,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/network-security-perimeter-why-is-this-concept-obsolete\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Network-Security-Perimeter-Why-Is-This-Concept-Obsolete.png\",\"keywords\":[\"Segura\",\"2022\"],\"articleSection\":[\"Segura\",\"2022\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/08\\\/how-has-robotic-process-automation-revolutionized-routine-execution\\\/\",\"url\":\"https:\\\/\\\/senhasegura.com\\\/network-security-perimeter-why-is-this-concept-obsolete\\\/\",\"name\":\"How Has Robotic Process Automation Revolutionized Routine Execution? - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/network-security-perimeter-why-is-this-concept-obsolete\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/network-security-perimeter-why-is-this-concept-obsolete\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Network-Security-Perimeter-Why-Is-This-Concept-Obsolete.png\",\"datePublished\":\"2022-08-23T01:12:55+00:00\",\"dateModified\":\"2022-09-29T09:41:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/network-security-perimeter-why-is-this-concept-obsolete\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/senhasegura.com\\\/network-security-perimeter-why-is-this-concept-obsolete\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/network-security-perimeter-why-is-this-concept-obsolete\\\/#primaryimage\",\"url\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Network-Security-Perimeter-Why-Is-This-Concept-Obsolete.png\",\"contentUrl\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Network-Security-Perimeter-Why-Is-This-Concept-Obsolete.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/network-security-perimeter-why-is-this-concept-obsolete\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Has Robotic Process Automation Revolutionized Routine Execution?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Has Robotic Process Automation Revolutionized Routine Execution? - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/senhasegura.com\/network-security-perimeter-why-is-this-concept-obsolete\/","og_locale":"zh_HK","og_type":"article","og_title":"How Has Robotic Process Automation Revolutionized Routine Execution? - Version 2","og_description":"For a long time, companies had data centers as their IT [&hellip;]","og_url":"https:\/\/senhasegura.com\/network-security-perimeter-why-is-this-concept-obsolete\/","og_site_name":"Version 2","article_published_time":"2022-08-23T01:12:55+00:00","article_modified_time":"2022-09-29T09:41:17+00:00","og_image":[{"url":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/08\/Network-Security-Perimeter-Why-Is-This-Concept-Obsolete.png","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"version2hk","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"9 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/senhasegura.com\/network-security-perimeter-why-is-this-concept-obsolete\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2022\/08\/how-has-robotic-process-automation-revolutionized-routine-execution\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"How Has Robotic Process Automation Revolutionized Routine Execution?","datePublished":"2022-08-23T01:12:55+00:00","dateModified":"2022-09-29T09:41:17+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2022\/08\/how-has-robotic-process-automation-revolutionized-routine-execution\/"},"wordCount":1716,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/senhasegura.com\/network-security-perimeter-why-is-this-concept-obsolete\/#primaryimage"},"thumbnailUrl":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/08\/Network-Security-Perimeter-Why-Is-This-Concept-Obsolete.png","keywords":["Segura","2022"],"articleSection":["Segura","2022","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2022\/08\/how-has-robotic-process-automation-revolutionized-routine-execution\/","url":"https:\/\/senhasegura.com\/network-security-perimeter-why-is-this-concept-obsolete\/","name":"How Has Robotic Process Automation Revolutionized Routine Execution? - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/senhasegura.com\/network-security-perimeter-why-is-this-concept-obsolete\/#primaryimage"},"image":{"@id":"https:\/\/senhasegura.com\/network-security-perimeter-why-is-this-concept-obsolete\/#primaryimage"},"thumbnailUrl":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/08\/Network-Security-Perimeter-Why-Is-This-Concept-Obsolete.png","datePublished":"2022-08-23T01:12:55+00:00","dateModified":"2022-09-29T09:41:17+00:00","breadcrumb":{"@id":"https:\/\/senhasegura.com\/network-security-perimeter-why-is-this-concept-obsolete\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/senhasegura.com\/network-security-perimeter-why-is-this-concept-obsolete\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/senhasegura.com\/network-security-perimeter-why-is-this-concept-obsolete\/#primaryimage","url":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/08\/Network-Security-Perimeter-Why-Is-This-Concept-Obsolete.png","contentUrl":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/08\/Network-Security-Perimeter-Why-Is-This-Concept-Obsolete.png"},{"@type":"BreadcrumbList","@id":"https:\/\/senhasegura.com\/network-security-perimeter-why-is-this-concept-obsolete\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"How Has Robotic Process Automation Revolutionized Routine Execution?"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/zh\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-eHZ","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/56543","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=56543"}],"version-history":[{"count":15,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/56543\/revisions"}],"predecessor-version":[{"id":56592,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/56543\/revisions\/56592"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=56543"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=56543"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=56543"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}