But there is another system, CrowdStrike, verifying the integrity of my device. And yet another system, Cloudflare, that verifies the integrity of the CrowdStrike connection. And we never go to a system integrator for all three layers or rather to any two adjacent layers, because that will – the next thing we know, it will be a vendor lock-in. It will be proprietary protocols and so on. So, we insist on open and interoperable protocols on each, like, juncture between the two system parameters.

Keyboard shortcuts

j previous speech k next speech