Print Issue: December 21, 2015
The approaches that each of these Innovators takes is focused on a specific way of viewing the security monitoring and analytics problem.
This is an entirely new category and it has become one of the most important areas of next-generation network and data protection.
There would be no need for security on our networks if we didn’t care about protecting the data that sit on them and travel on them.
We still need the functionality of traditional protections – at least in part – but the manner of deployment is quite different.
The perimeter is disappearing.
The approaches to access control have varied over the decades, but today the challenges are greater than ever.
I don’t think I’ve seen any year where real innovation was more evident, says Technology Editor Peter Stephenson.
Many organizations still hesitate to move to the cloud. Why?
Under the placid waters of the corporate network, hackers lie in wait to launch a breach. Their prey? Sensitive personal information. Teri Robinson reports.
This year has been marked by the almost daily occurrence of some information security-related incident or another.
Next post in Opinions