Complexity is the real vulnerability

  • October 6, 2015

Security is a unique IT discipline. It overlays and supports all other disciplines: computers, networks, storage, apps, data. As IT evolves, so does IT security (often with a considerable lag). The introduction of personal computing gave rise to endpoint protection suites and AV capabilities. Networks drove the introduction of the firewall. Applications spawned multiple security disciplines from two-factor authentication to secure app development, vulnerability scanning and web application firewalls. Databases introduced encryption and activity monitoring – and to manage all these capabilities we now have Security Information and Event Management (SIEM) platforms.

Read more >

Idan Hershkovich

Idan Hershkovich

Idan is Cato Networks’ marketing director. He has extensive experience in digital marketing, IT software solutions, collaboration and enterprise mobility. Looking forward to revolutionizing the way network security is being managed.

More Posts

Idan Hershkovich

Author: Idan Hershkovich

Idan is Cato Networks’ marketing director. He has extensive experience in digital marketing, IT software solutions, collaboration and enterprise mobility. Looking forward to revolutionizing the way network security is being managed.