Enabling Appropriate User Access in a “Zero Trust” World


Bill Mann, Chief Product Officer at Centrify, suggests some strategies for securing today’s perimeter-less enterprise environments – including stronger enforcement of well-defined policies for user access, integration of security into DevOps processes, and smarter use of ML for anomaly detection.

Comment  | 
Print  | 
Copyright © 2021 UBM Electronics, A UBM company, All rights reserved. Privacy Policy | Terms of Service