Devices outside the Enterprise Perimeter
A mobile workforce, using a wide range of devices on many different networks,
is difficult to manage using the traditional inside/outside network perimeter model.
This talk discusses using an alternate architecture, where privileges are granted based
on a wider range of factors, not just network address being asserted by the device.
The Overcast architecture blueprint is key to this, presenting a model of machine identity, authentication and inventory-aware authorization.