Print Issue: December 21, 2015
The evaporation of the perimeter has made the idea of an infrastructure a bit fuzzy and, certainly, the notion of a surety infrastructure is an equally gray area.
Encryption will impact everyone from security personnel to consumers in the post-quantum computing world, reports Doug Olenick.
The approaches that each of these Innovators takes is focused on a specific way of viewing the security monitoring and analytics problem.
This is an entirely new category and it has become one of the most important areas of next-generation network and data protection.
There would be no need for security on our networks if we didn’t care about protecting the data that sit on them and travel on them.
We still need the functionality of traditional protections – at least in part – but the manner of deployment is quite different.
The perimeter is disappearing.
The approaches to access control have varied over the decades, but today the challenges are greater than ever.
I don’t think I’ve seen any year where real innovation was more evident, says Technology Editor Peter Stephenson.
Many organizations still hesitate to move to the cloud. Why?
Next post in Opinions