Beyond Identity Access Management: The Next Steps in Post-Perimeter Defense
By Carolyn Crandall, Chief Security Advocate, Attivo Networks The last few years have seen an increased acceptance that traditional perimeter-based defenses such as firewalls are not enough, and that attention needs to shift to identity security. This approach focuses on verifying the identity of users with a high degree of accuracy, working on the assumption …
Beyond Identity Access Management: The Next Steps in Post-Perimeter Defense Read More »