Tag: Policy Management

  • Product Walkthrough: Silverfort’s Unified Identity Protection Platform

    In this article, we will provide a brief overview of Silverfort’s platform, the first (and currently only) unified identity protection …

  • Network Security Policy Management: Seeking Visibility

    Visibility AlgoSec’s Jeffrey Starr Says IT Environments Ever More Heterogeneous and Complex Mathew J. Schwartz (euroinfosec) • June 19, …

  • Aporeto’s Vision for a Shared Orchestration and Security Platform

    If you’re familiar with the way modern application orchestrators work, a config file enables a developer to specify the “intent” of the application — the ideal operating conditions for the application, if they’re reasonable. And if you know about how security policy tends to work, then you know it’s based on rules that are triggered by…

  • Containers and Security: What’s the Effect and Who’s Responsible?

    Now that containerization and orchestration platforms have upset the proverbial apple cart with respect to traditional concepts such as endpoint security, what are the points in the modern network that get security treatment, and who’s responsible for them? There was talk a few years back about making containerized application developers more responsible for baking security…

  • Containers and Security: What’s the Affect and Who’s Responsible?

    Now that containerization and orchestration platforms have upset the proverbial apple cart with respect to traditional concepts such as endpoint security, what are the points in the modern network that get security treatment, and who’s responsible for them? There was talk a few years back about making containerized application developers more responsible for baking security…