Devices outside the Enterprise Perimeter


A mobile workforce, using a wide range of devices on many different networks,
is difficult to manage using the traditional inside/outside network perimeter model.

This talk discusses using an alternate architecture, where privileges are granted based
on a wider range of factors, not just network address being asserted by the device.

The Overcast architecture blueprint is key to this, presenting a model of machine identity, authentication and inventory-aware authorization.

Los Angeles A
Saturday, February 22, 2014 - 16:30 to 17:30