For years now, the approach for comprehensive IT security was to limit access to the company network with a firewall. However, the distinction between “in front of the firewall” and “behind the firewall” no longer applies to today’s IT landscapes. Cloud applications, accesses via the mobile devices of employees, etc. – all of this would have to be navigated and managed by a firewall. In a modern IT environment, it is more advisable to design the user authentication flexibly, so that it is not only equipped for today’s requirements, but those of the future.
We would be glad to consult with you about your options.