OREV operates on the premise that the network perimeter has essentially ceased to exist. OREV has repositioned cybersecurity defenses from static, network-based perimeters to focus on identity, users, assets, access management, operations, endpoints, hosting environments and the interconnecting infrastructure. OREV emphasizes resource protection and the belief that trust is never granted implicitly but must be continually evaluated.
The IST agents will do “on the spot” analysis, instantly. That includes, identifying anomaly issues at all fields, vulnerable locations of the network, suspicious events. Instant analysis leading to instant issue identification. The IST agents make the OREV universe possible.