« Back to Glossary Index

An approach to computer security that hides internet-connected infrastructure so external parties and attackers can’t see it. The goal is to base the network perimeter on software (instead of hardware).

Synonyms:
instead of hardware
« Back to Glossary Index