# Perimeter-based Security
[Perimeter-Based Security: 3 Alternate Approaches](https://redcanary.com/blog/perimeter-based-security-common-mistakes/)
[Traditional perimeter-based network defense is obsolete—transform to a Zero Trust model](https://www.microsoft.com/security/blog/2019/10/23/perimeter-based-network-defense-transform-zero-trust-model/)
vs [[Zero Trust Security Model]]
[Perimeter-Based Security: 3 Alternate Approaches](https://redcanary.com/blog/perimeter-based-security-common-mistakes/)
[Traditional perimeter-based network defense is obsolete—transform to a Zero Trust model](https://www.microsoft.com/security/blog/2019/10/23/perimeter-based-network-defense-transform-zero-trust-model/)