{"id":7062,"date":"2013-04-19T14:29:22","date_gmt":"2013-04-19T14:29:22","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/2622868"},"modified":"2013-04-19T14:29:22","modified_gmt":"2013-04-19T14:29:22","slug":"the-new-standard-intelligence-driven-security-2","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/the-new-standard-intelligence-driven-security-2\/","title":{"rendered":"The New Standard: Intelligence-Driven Security"},"content":{"rendered":"<p>Network perimeters are all but erased and traditional security strategies such as stacking don&#8217;t adequately address the current needs of a modern enterprise. Many companies are still using strategies rooted in 2002 technologies and approaches. The new intelligence-based security model is one that integrates several alerting, analytical and preventative tools into a central monitor and management best practice.<br \/>\nIn a recent blog post, Art Coviello, the executive chairman at RSA, posed an important question. How do we move from traditional security to intelligence-driven security? In his answer he described that the quickly interdependent exchanges between parties (B2C, B2B, B2P, etc) have grown beyond the traditional means of securing the enterprise.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/2622868\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Network perimeters are all but erased and traditional security strategies such as stacking don&#8217;t adequately address the current needs of a modern enterprise. Many companies are still using strategies rooted in 2002 technologies and approaches. The new &#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-7062","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/7062","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=7062"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/7062\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=7062"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=7062"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=7062"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}