Back in the golden age of cartoons – at least my golden age – there was a company called “Spacely Space Sprockets, Inc.” that employed the well-meaning, yet stressed at times George Jetson. Many an episode included the company and how they used advancements in technology to outperform their competition “Cogswell Cogs”. When employees showed up for their hard day’s work, they only needed to push a button once to start and stop things. To this day, I have no actual idea what they made, but I have come to realize that this is how the best technology ends up working.
If you look at the march of technology in the security space, not only has it become more sophisticated, the deployment has become increasingly frictionless. Today’s IT professionals have adopted the model of not needing to deeply understand the underlying products they support, they just need to understand the risks it might pose to the enterprise. From there they can then implement the simplest, most cost-effective solution to mitigate that risk.
No IT professional would be expected to understand the intricacies of an operating system to deploy a virus scanner. It would be unreasonable to expect your IT department to write custom code that opened every packet entering a system, inspect the packet for intent, then write code to apply rules to handle that particular packet. No matter how good the tools that you give them are, “slow and costly” is not the mantra for any modern IT department.
Many API management companies would have you believe that is state-of-the-art technology for secure enterprise digital services. Their tools are designed for programmers by programmers. Implicit in this design is the fact that you need to have deep understanding of a service to properly protect your enterprise. No matter how many cool tools and drag and drop GUI’s they provide, your IT staff better have a programming degree and be willing to dedicate a couple of months’ time to implement even the most basic solution. An inescapable truism in the IT world is that time is directly proportional to cost and complexity of the solution being deployed.
At Trapize, our digital services broker makes you a modern-day George Jetson. The enterprise IT staff never needs to understand the service and is never exposed to sensitive company or personal information. Our catalog currently supports over 1000 of the most popular digital services in use today. Browse our catalog, pick a service, then click a button. Monitoring, compliance, and governance with a single click of the mouse. Not only should it be that easy, now it is.