1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

IDG Contributor Network: Identity: the new perimeter?

Discussion in 'CSO' started by RSS, Jun 17, 2016.

  1. RSS

    RSS New Member Member

    Organizations continue to focus the bulk of their security spending on endpoints, as well as server and network security software/solutions. Yet as organizations turn to new cloud and mobile infrastructure, they lose the control they once had over their IT assets.

    If protecting the perimeter no longer provides sufficient security, then what alternatives do security practitioners have to best defend the enterprise?

    For those who are new to security, you've likely been trained in user identity, access management, and behavior analytics, but knowing which tools will provide you the greatest visibility and finding the budget for those tools might be a challenge.

    To read this article in full or to leave a comment, please click here

    Continue reading...
     

Share This Page