Security management has historically been focused on the user attempting to access a resource. But in the increasingly complex world of CI/CD methodologies and microservices, it’s no longer “Users” and “Resources” we need to secure. Applications need to talk to each other, resources need to move from development through production and be managed by automated systems, and the systems themselves have become consumers and contributors.

Our 11-minute overview, available on YouTube, describes how to tie together your development, QA, deployment, and support process with all the people, applications, environments, and devices you need under a centrally-managed, programmatically-enforced security policy.