
Twenty years ago, when enterprise information security was starting to hit its stride, nearly all enterprise security software products were bought as point solutions. They did one job – resist malware, scan for vulnerabilities, encrypt data, detect intrusions, etc. — very well. But over time the number of tools in the security practitioner’s toolbox grew […]