March 2021
Intermediate to advanced
400 pages
14h 24m
English
This rapid change in the IT landscape revolutionized the way IT approached security. Gone was the traditional fortress mentality, with its insider and outsider approach, and so too went the VPN. This was because if mobility had blurred the edges between inside and outside, then the cloud had obliterated any distinction for good. In its place came more flexible and granular policy driven systems for identity verification, access authorization, and fine-grained permissions-based actions on profile and context.
The challenges that BYOD had forced upon IT security was that it was near impossible for administrators to deploy and enforce an effective security policy that spans all of those different makes and ...