In the Cybersecurity Battleground, Location Matters (But Not Exclusively)
In the Cybersecurity Battleground, Location Matters (But Not Exclusively)
RELEASE DATE
22-Dec-2017
22-Dec-2017
REGION
North America
North America
Research Code: 9B0F-00-46-00-00
SKU: IT03581-NA-SF_21453
$3,000.00
In stock
SKU
IT03581-NA-SF_21453
Description
Cybersecurity technologies strategically reside in three primary locations:
--In devices – endpoints
--Surrounding networks of endpoints and systems – perimeters
--Between devices and users, and their destinations – gateways (or proxies)
How the collection of locations improves cybersecurity efficacy (i.e., “better together”) is ultimately the most important barometer of success. In this SPIE, Stratecast offers its perspective on the notion of strategic locations and “better together.”
Table of Contents
Introduction
The Ties that Bind
Data
Analytics
Execution
Stratecast - The Last Word
About Stratecast
About Frost & Sullivan
Popular Topics
Cybersecurity technologies strategically reside in three primary locations:
--In devices – endpoints
--Surrounding networks of endpoints and systems – perimeters
--Between devices and users, and their destinations – gateways (or proxies)
How the collection of locations improves cybersecurity efficacy (i.e., “better together”) is ultimately the most important barometer of success. In this SPIE, Stratecast offers its perspective on the notion of strategic locations and “better together.”
No Index | No |
---|---|
Podcast | No |
Author | Michael Suby |
Industries | Information Technology |
WIP Number | 9B0F-00-46-00-00 |
Is Prebook | No |