"The traditional IT perimeter no longer exists, hence neither does the traditional perimeter defense posture," she wrote in an e-mail. But, that doesn't mean implementing these systems is just a plug-and-play and you're ready to go. "Next generation security monitoring, maintenance and management is expensive and requires highly skilled professionals," she says. "It will rely more on real time information profiling and back end analytics and less on passwords and simplistic access methods."
Vendors in this market include IBM, CA Technologies, RSA the security division of EMC, Oracle, Covisint, NetIQ and Ping Identity, among other newer companies like Okta, OneLogin, ForgeRock and Symplified, she says.
Sign up for Computerworld eNewsletters.