March 2026
Intermediate to advanced
400 pages
15h 45m
English
This rapid change in the IT landscape revolutionized the way IT approached security. Gone was the traditional fortress mentality, with its insider and outsider approach, and so too went the VPN. This was because if mobility had blurred the edges between inside and outside, then the cloud had obliterated any distinction for good. In its place came more flexible and granular policy-driven systems for identity verification, access authorization, and fine-grained permissions-based actions on profile and context.
The challenge that BYOD had forced upon IT security was that it was nearly impossible for administrators to deploy and enforce an effective security policy that spanned all those different makes and ...
Read now
Unlock full access