To secure such an environment, it was necessary to put a very strong perimeter around your technology environment which included technologies such as firewalls, intrusion detection systems, network access control, VPNs and the like. Adopting a new application or platform typically involved months of planning, waiting for hardware to arrive and configuring and testing the infrastructure prior to deployment. Mature organizations have vast amounts of infrastructure, most of which is housed in data centers owned and operated by the company. If you compare and contrast technology architectures between traditional, mature organizations and those that have sprung up in the last 3-5 years, they are vastly different. As business models change, the security model needs to evolve and adapt. ![]() ![]() What I find in speaking with leaders across companies is that they don't understand that traditional "tried and true" security models don't meet the needs of an effective organization in 2018. Business models evolve, technology evolves and even the workforce evolves.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |