Corro'll (Kuh'rel) Driskell

72%
Flag icon
When a user requests access to enterprise systems, our architecture will dynamically calculate trust based on contextual information such as the user’s identity, the security features of the device they’re using, their physical location, and the resources they’re trying to access.
Managing Risk and Information Security: Protect to Enable
Rate this book
Clear rating