XYZ Without Classification – is just (weak) XYZ
It is very clear what I’ve been spouting for years – perimeter security technologies WITHOUT end-user guided, steward-approved and maintained classifications result in lack luster performance, capabilities and increased user frustration – making the (significant) investment negated and oft-times ineffectual. Do you (CIO, CISO, VP InfoSec, SecArch, SecEng, etc.) want