Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

How hybrid cloud is hastening the demise of traditional firewall security

Brandon Butler | Aug. 1, 2013
Advent of hybrid cloud computing and BYOD ushers in need for newer, identity-based security options, experts say.

"The traditional IT perimeter no longer exists, hence neither does the traditional perimeter defense posture," she wrote in an e-mail. But, that doesn't mean implementing these systems is just a plug-and-play and you're ready to go. "Next generation security monitoring, maintenance and management is expensive and requires highly skilled professionals," she says. "It will rely more on real time information profiling and back end analytics and less on passwords and simplistic access methods."

Vendors in this market include IBM, CA Technologies, RSA the security division of EMC, Oracle, Covisint, NetIQ and Ping Identity, among other newer companies like Okta, OneLogin, ForgeRock and Symplified, she says.

 

Previous Page  1  2 

Sign up for Computerworld eNewsletters.