The Moat is Empty; How is the Castle Protected?
Jun 26 2017

DATE
Jun 26, 2017

HOSTED BY
SC Magazine 20/20 Webcast

The Moat is Empty; How is the Castle Protected?

Historically, corporate data security focused on network-centric devices. One would protect the network at the perimeter, then build layers of defenses much like an onion or parfait has layers. Encryption and identity and access management (IAM) were added, but often as point products.

This focus on the network is still common in many companies much in the same way that in the medical profession, specialists are used more often than general practitioners. A more holistic approach that focuses on data and applications rather than devices is finding its share of followers. Today’s 20/20 webcast looks at this application and data-focused approach – its benefits and challenges.