You’ve probably heard the phrase “identity is the new perimeter.” It’s repeated often in security circles, and for good reason. In most companies, identity has long been considered a supporting function. It’s treated as a gateway to systems, a set of policies to manage access, and a line item on the security checklist.
But the landscape has…