# Perimeter-based Security [Perimeter-Based Security: 3 Alternate Approaches](https://redcanary.com/blog/perimeter-based-security-common-mistakes/) [Traditional perimeter-based network defense is obsolete—transform to a Zero Trust model](https://www.microsoft.com/security/blog/2019/10/23/perimeter-based-network-defense-transform-zero-trust-model/) vs [[Zero Trust Security Model]] [Perimeter-Based Security: 3 Alternate Approaches](https://redcanary.com/blog/perimeter-based-security-common-mistakes/) [Traditional perimeter-based network defense is obsolete—transform to a Zero Trust model](https://www.microsoft.com/security/blog/2019/10/23/perimeter-based-network-defense-transform-zero-trust-model/)