Distributed Integrity: A New Security Model to Replace Perimeters

Distributed Integrity: A New Security Model to Replace Perimeters

This IDC Insight lays out IDC's Distributed Integrity Security Model. It describes the challenges associated with the antiquated perimeter-based security model with defense in depth and provides the elements of a new proactive security model that more closely aligns with 3rd Platform technologies and digital transformation initiatives.

IDC Opinion
In This Insight
Situation Overview
Toward a Resolution
Future Outlook
The Distributed Integrity Security Model
Focuses on Users, Data, and Applications
Uses "Tracers and Tethers" for Primary Object Protection
Tracers Collect and Maintain User Activity and Object Pedigree Records
Tethers Provide Roots of Trust for Remote Attestation
Leverages a Policy Abstraction Language for Access Control
Authenticates Sessions at Both Ends
Hardens and Routes Paths Through Security Gateways
A Cloud DMZ Model
Benefits of the Distributed Integrity Security Model
Essential Guidance

Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook