Boundary protection technologies
|“||demark a logical or physical boundary between protected information and systems and unknown users. Boundary protection technologies can be used to protect a network (for example, firewalls) or a single computer (for example, personal firewalls).||”|
"Generally, these technologies prevent access to the network or computer by external unauthorized users. Another type of boundary protection technology, content management, can also be used to restrict the ability of authorized system or network users to access systems or networks beyond the system or network boundary."