Most team sports (that have a half time) also seem to receive the “game of two halves” cliche – namely by supporters of the team who have had a bad first half. Alas, it’s a great analogy and can be applied to numerous long running scenarios, games and projects.
Why should I apply it to Identity Threat Detection and Response? Well this is a great topic that is emerging (see last 3 years) within identity and has received a lot of attention from vendors, buyers and investors alike. However, speak to 5 different interested parties and they’re likely to provide five different views or definitions of capabilities.
To add to the muddy waters a little, I wanted to expand to this based on conversations I’ve had over past 4-5 months as part of a research report coming out soon from The Cyber Hut on ITDR – what it is and why it’s important now. The last thing I want to do however, is create more confusion and definitions! In order to avoid that I want to break down the term bit by bit.
The I in ITDR
Let’s start of with the easy part. The I. This covers identity, but really should cover the entire identity infrastructure. Well what does that mean? Well identity (and…