This event proceeding was presented at IDC Directions in March 2020.
As the network perimeter dissipates, the new control points become identity, endpoints, data, and applications. The foundation of security in this almost infinite scope of protection control points becomes analytics. Participants will learn the extensive role of how analytics are used to establish statistical baselines to find anomalies between gaps in point products; analytics detect breaches to individual identities, if entities are moving laterally between policy zones and if a platform is "compliant" both from the standpoint of regulators and within a given organization's parameters. Perhaps most important, the session will discuss how analytics help determine risk.