But what we used it for as well was a bit of a bureaucracy mechanism to get various vendors to play together and their technology to work seamlessly. So, the idea of the program was intentional redundancy of every point of security. So, if you have one layer of encryption, let’s say it’s AES-256, you need to have a second layer of encryption that uses a different implementation or a different standard. Encryption is one that’s relatively easy. They all seem to layer quite nicely, but when you start talking about identity federation or firewall rules, getting multiple firewall vendors to work together seamlessly was a bit of an effort.

Keyboard shortcuts

j previous speech k next speech