the process of identifying, implementing, and managing the rules and procedures that all individuals must follow when accessing and using an organization's IT assets and resources.
Improves visibility and control across networks, multi-vendor firewalls, SDN, hybrid, and public cloud.