Posts by Matt Miller

  1. Identity-Centric Security: 10 Data Points from 10 Different Vendors (and a book) Make the Case

    There’s almost universal consensus that perimeter-centric security is insufficient for today’s distributed IT environments. But where debate amongst IT pros and vendors now rages is whether the optimal enterprise security approach today is application-centric, data-centric, or identity-centric. Data-centric and application-centric approaches have merit, but each can be undermined simply by the wrong identity accessing data,…

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.