Skip to main content

The New Perimeter Is the User: Why Identity Is the Real Network Edge

Prakash Mana
Cloudbrink

The Perimeter Didn't Disappear, It Just Moved

For years, cybersecurity was built around a simple assumption: protect the physical network and trust everything inside it. That model made sense when employees worked in offices, applications lived in data centers, and devices rarely left the building.

Today's reality is fluid: people work from everywhere, applications run across multiple clouds, and AI-driven agents are beginning to act on behalf of users. But while the old perimeter dissolved, a new one quietly emerged. It didn't vanish; it relocated to the only constant that still anchors an enterprise: the user.

Identity — not the network — now defines the security boundary.

Identity Is the New Control Plane

In a distributed world, users move between networks, devices, and environments constantly. What doesn't change is who they are and what they're allowed to do. Identity follows the user, and attackers understand this better than anyone. That's why the most damaging breaches today don't require sophisticated exploits; they begin with something deceptively simple: logging in with stolen credentials.

When one compromised identity can unlock cloud platforms, trigger workflows, access financial systems, or retrieve sensitive documents, it becomes the most valuable entry point for attackers, and the most critical asset for defenders.

This is why security must begin not with location or network segment, but with who is requesting access and how trustworthy they are at that moment.

Why Traditional Perimeters Keep Failing

Many companies still rely on the idea that "inside equals safe." The problem is that "inside" barely exists anymore. A user in a coffee shop can be just as legitimate as one in the office. A compromised employee device can be far more dangerous inside the network than a controlled partner device outside of it.

Legacy models also assume trust lasts. A single login often grants days of unchecked access, even if the user's behavior suddenly becomes suspicious or the device posture changes.

Modern threats move too quickly for that. As work becomes more distributed, static trust becomes a liability.

Identity-Based Access Solves the Right Problem

If the user is now the perimeter, the security model must shift from network-based rules to identity-driven decisions. Instead of asking, "Is this person inside our network?" the modern approach asks:

  • Who is the user?
  • What are they trying to access?
  • What device are they using?
  • Where are they connecting from?
  • Does their current behavior align with what we expect?

When access is evaluated through this lens — continuously, not just at login — risk becomes visible, manageable, and more precise. And because access is granted to resources rather than to broad network segments, the blast radius of any compromise shrinks dramatically.

Why Identity-First Architecture Improves Performance Too

Adopting identity as the perimeter is a performance upgrade. When connectivity is tied to who the user is, rather than forcing all traffic through centralized gateways, companies can eliminate backhauling, reduce congestion, and offer faster routes directly to applications.

For employees, that means fewer delays and smoother application performance. For IT teams, it means visibility into user experience that is impossible with traditional VPNs or static tunnels.

Security and usability have long been seen as opposing forces. Identity-first access shows they can and must reinforce each other.

The New Security Stack for a User-Centric World

Transitioning to identity as the perimeter doesn't require throwing out everything and starting over. What it does require is coherence. Identity providers, authentication systems, endpoint intelligence, and modern access controls need to operate as one decision-making engine rather than isolated systems stitched together.

This unified fabric is what turns Zero Trust from a slogan into something operational: access that adapts continuously to risk, not statically to network boundaries.

Why Protecting Identity Is Now a CEO's Job

The biggest barrier to modernizing access isn't technical — it's conceptual. Many organizations still treat identity as a feature they can add later rather than the organizing principle around which everything else should be built.

The second mistake is assuming users must suffer for security. In reality, identity-based access reduces friction when trust is high and increases scrutiny only when risk demands it. The right model is almost invisible when everything is normal, and extremely precise when it's not.

Done well, Zero Trust isn't restrictive. It's liberating.

Identity threats don't just disrupt operations; they undermine trust. A single compromised credential today can halt sales, expose intellectual property, or trigger compliance failures. Boards now evaluate identity strategy as a measure of resilience, not as a technical detail buried deep in IT.

As the perimeter shifts to the user, defending identity becomes inseparable from protecting brand, reputation, and continuity. This makes identity-first security a CEO-level responsibility.

Conclusion: When You Secure the User, You Secure Everything

In a world where data, devices, and applications are everywhere, the only consistent point of control left is the user. Treating identity as the new perimeter aligns security with how the modern enterprise actually works: dynamic, distributed, and always in motion.

Organizations that embrace this shift early will operate faster, safer, and with far greater confidence.

Forward-thinking innovators including companies like Cloudbrink are already demonstrating how secure, high-performance access can follow the user wherever work happens.

Secure the user, and you secure the business. It's that simple — and that transformational.

Prakash Mana is CEO of Cloudbrink

The Latest

In MEAN TIME TO INSIGHT Episode 23, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses the NetOps labor shortage ... 

Technology management is evolving, and in turn, so is the scope of FinOps. The FinOps Foundation recently updated their mission statement from "advancing the people who manage the value of cloud" to "advancing the people who manage the value of technology." This seemingly small change solidifies a larger evolution: FinOps practitioners have organically expanded to be focused on more than just cloud cost optimization. Today, FinOps teams are largely — and quickly — expanding their job descriptions, evolving into a critical function for managing the full value of technology ...

Enterprises are under pressure to scale AI quickly. Yet despite considerable investment, adoption continues to stall. One of the most overlooked reasons is vendor sprawl ... In reality, no organization deliberately sets out to create sprawling vendor ecosystems. More often, complexity accumulates over time through well-intentioned initiatives, such as enterprise-wide digital transformation efforts, point solutions, or decentralized sourcing strategies ...

Nearly every conversation about AI eventually circles back to compute. GPUs dominate the headlines while cloud platforms compete for workloads and model benchmarks drive investment decisions. But underneath that noise, a quieter infrastructure challenge is taking shape. The real bottleneck in enterprise AI is not processing power, it is the ability to store, manage and retrieve the relentless volumes of data that AI systems generate, consume and multiply ...

The 2026 Observability Survey from Grafana Labs paints a vivid picture of an industry maturing fast, where AI is welcomed with careful conditions, SaaS economics are reshaping spending decisions, complexity remains a defining challenge, and open standards continue to underpin it all ...

The observability industry has an evolving relationship with AI. We're not skeptics, but it's clear that trust in AI must be earned ... In Grafana Labs' annual Observability Survey, 92% said they see real value in AI surfacing anomalies before they cause downtime. Another 91% endorsed AI for forecasting and root cause analysis. So while the demand is there, customers need it to be trustworthy, as the survey also found that the practitioners most enthusiastic about AI are also the most insistent on explainability ...

In the modern enterprise, the conversation around AI has moved past skepticism toward a stage of active adoption. According to our 2026 State of IT Trends Report: The Human Side of Autonomous AI, nearly 90% of IT professionals view AI as a net positive, and this optimism is well-founded. We are seeing agentic AI move beyond simple automation to actively streamlining complex data insights and eliminating the manual toil that has long hindered innovation. However, as we integrate these autonomous agents into our ecosystems, the fundamental DNA of the IT role is evolving ...

AI workloads require an enormous amount of computing power ... What's also becoming abundantly clear is just how quickly AI's computing needs are leading to enterprise systems failure. According to Cockroach Labs' State of AI Infrastructure 2026 report, enterprise systems are much closer to failure than their organizations realize. The report ... suggests AI scale could cause widespread failures in as little as one year — making it a clear risk for business performance and reliability.

The quietest week your engineering team has ever had might also be its best. No alarms going off. No escalations. No frantic Teams or Slack threads at 2 a.m. Everything humming along exactly as it should. And somewhere in a leadership meeting, someone looks at the metrics dashboard, sees a flat line of incidents and says: "Seems like things are pretty calm over there. Do we really need all those people?" ... I've spent many years in engineering, and this pattern keeps repeating ...

The gap is widening between what teams spend on observability tools and the value they receive amid surging data volumes and budget pressures, according to The Breaking Point for Observability Leaders, a report from Imply ...

The New Perimeter Is the User: Why Identity Is the Real Network Edge

Prakash Mana
Cloudbrink

The Perimeter Didn't Disappear, It Just Moved

For years, cybersecurity was built around a simple assumption: protect the physical network and trust everything inside it. That model made sense when employees worked in offices, applications lived in data centers, and devices rarely left the building.

Today's reality is fluid: people work from everywhere, applications run across multiple clouds, and AI-driven agents are beginning to act on behalf of users. But while the old perimeter dissolved, a new one quietly emerged. It didn't vanish; it relocated to the only constant that still anchors an enterprise: the user.

Identity — not the network — now defines the security boundary.

Identity Is the New Control Plane

In a distributed world, users move between networks, devices, and environments constantly. What doesn't change is who they are and what they're allowed to do. Identity follows the user, and attackers understand this better than anyone. That's why the most damaging breaches today don't require sophisticated exploits; they begin with something deceptively simple: logging in with stolen credentials.

When one compromised identity can unlock cloud platforms, trigger workflows, access financial systems, or retrieve sensitive documents, it becomes the most valuable entry point for attackers, and the most critical asset for defenders.

This is why security must begin not with location or network segment, but with who is requesting access and how trustworthy they are at that moment.

Why Traditional Perimeters Keep Failing

Many companies still rely on the idea that "inside equals safe." The problem is that "inside" barely exists anymore. A user in a coffee shop can be just as legitimate as one in the office. A compromised employee device can be far more dangerous inside the network than a controlled partner device outside of it.

Legacy models also assume trust lasts. A single login often grants days of unchecked access, even if the user's behavior suddenly becomes suspicious or the device posture changes.

Modern threats move too quickly for that. As work becomes more distributed, static trust becomes a liability.

Identity-Based Access Solves the Right Problem

If the user is now the perimeter, the security model must shift from network-based rules to identity-driven decisions. Instead of asking, "Is this person inside our network?" the modern approach asks:

  • Who is the user?
  • What are they trying to access?
  • What device are they using?
  • Where are they connecting from?
  • Does their current behavior align with what we expect?

When access is evaluated through this lens — continuously, not just at login — risk becomes visible, manageable, and more precise. And because access is granted to resources rather than to broad network segments, the blast radius of any compromise shrinks dramatically.

Why Identity-First Architecture Improves Performance Too

Adopting identity as the perimeter is a performance upgrade. When connectivity is tied to who the user is, rather than forcing all traffic through centralized gateways, companies can eliminate backhauling, reduce congestion, and offer faster routes directly to applications.

For employees, that means fewer delays and smoother application performance. For IT teams, it means visibility into user experience that is impossible with traditional VPNs or static tunnels.

Security and usability have long been seen as opposing forces. Identity-first access shows they can and must reinforce each other.

The New Security Stack for a User-Centric World

Transitioning to identity as the perimeter doesn't require throwing out everything and starting over. What it does require is coherence. Identity providers, authentication systems, endpoint intelligence, and modern access controls need to operate as one decision-making engine rather than isolated systems stitched together.

This unified fabric is what turns Zero Trust from a slogan into something operational: access that adapts continuously to risk, not statically to network boundaries.

Why Protecting Identity Is Now a CEO's Job

The biggest barrier to modernizing access isn't technical — it's conceptual. Many organizations still treat identity as a feature they can add later rather than the organizing principle around which everything else should be built.

The second mistake is assuming users must suffer for security. In reality, identity-based access reduces friction when trust is high and increases scrutiny only when risk demands it. The right model is almost invisible when everything is normal, and extremely precise when it's not.

Done well, Zero Trust isn't restrictive. It's liberating.

Identity threats don't just disrupt operations; they undermine trust. A single compromised credential today can halt sales, expose intellectual property, or trigger compliance failures. Boards now evaluate identity strategy as a measure of resilience, not as a technical detail buried deep in IT.

As the perimeter shifts to the user, defending identity becomes inseparable from protecting brand, reputation, and continuity. This makes identity-first security a CEO-level responsibility.

Conclusion: When You Secure the User, You Secure Everything

In a world where data, devices, and applications are everywhere, the only consistent point of control left is the user. Treating identity as the new perimeter aligns security with how the modern enterprise actually works: dynamic, distributed, and always in motion.

Organizations that embrace this shift early will operate faster, safer, and with far greater confidence.

Forward-thinking innovators including companies like Cloudbrink are already demonstrating how secure, high-performance access can follow the user wherever work happens.

Secure the user, and you secure the business. It's that simple — and that transformational.

Prakash Mana is CEO of Cloudbrink

The Latest

In MEAN TIME TO INSIGHT Episode 23, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses the NetOps labor shortage ... 

Technology management is evolving, and in turn, so is the scope of FinOps. The FinOps Foundation recently updated their mission statement from "advancing the people who manage the value of cloud" to "advancing the people who manage the value of technology." This seemingly small change solidifies a larger evolution: FinOps practitioners have organically expanded to be focused on more than just cloud cost optimization. Today, FinOps teams are largely — and quickly — expanding their job descriptions, evolving into a critical function for managing the full value of technology ...

Enterprises are under pressure to scale AI quickly. Yet despite considerable investment, adoption continues to stall. One of the most overlooked reasons is vendor sprawl ... In reality, no organization deliberately sets out to create sprawling vendor ecosystems. More often, complexity accumulates over time through well-intentioned initiatives, such as enterprise-wide digital transformation efforts, point solutions, or decentralized sourcing strategies ...

Nearly every conversation about AI eventually circles back to compute. GPUs dominate the headlines while cloud platforms compete for workloads and model benchmarks drive investment decisions. But underneath that noise, a quieter infrastructure challenge is taking shape. The real bottleneck in enterprise AI is not processing power, it is the ability to store, manage and retrieve the relentless volumes of data that AI systems generate, consume and multiply ...

The 2026 Observability Survey from Grafana Labs paints a vivid picture of an industry maturing fast, where AI is welcomed with careful conditions, SaaS economics are reshaping spending decisions, complexity remains a defining challenge, and open standards continue to underpin it all ...

The observability industry has an evolving relationship with AI. We're not skeptics, but it's clear that trust in AI must be earned ... In Grafana Labs' annual Observability Survey, 92% said they see real value in AI surfacing anomalies before they cause downtime. Another 91% endorsed AI for forecasting and root cause analysis. So while the demand is there, customers need it to be trustworthy, as the survey also found that the practitioners most enthusiastic about AI are also the most insistent on explainability ...

In the modern enterprise, the conversation around AI has moved past skepticism toward a stage of active adoption. According to our 2026 State of IT Trends Report: The Human Side of Autonomous AI, nearly 90% of IT professionals view AI as a net positive, and this optimism is well-founded. We are seeing agentic AI move beyond simple automation to actively streamlining complex data insights and eliminating the manual toil that has long hindered innovation. However, as we integrate these autonomous agents into our ecosystems, the fundamental DNA of the IT role is evolving ...

AI workloads require an enormous amount of computing power ... What's also becoming abundantly clear is just how quickly AI's computing needs are leading to enterprise systems failure. According to Cockroach Labs' State of AI Infrastructure 2026 report, enterprise systems are much closer to failure than their organizations realize. The report ... suggests AI scale could cause widespread failures in as little as one year — making it a clear risk for business performance and reliability.

The quietest week your engineering team has ever had might also be its best. No alarms going off. No escalations. No frantic Teams or Slack threads at 2 a.m. Everything humming along exactly as it should. And somewhere in a leadership meeting, someone looks at the metrics dashboard, sees a flat line of incidents and says: "Seems like things are pretty calm over there. Do we really need all those people?" ... I've spent many years in engineering, and this pattern keeps repeating ...

The gap is widening between what teams spend on observability tools and the value they receive amid surging data volumes and budget pressures, according to The Breaking Point for Observability Leaders, a report from Imply ...