Five Minutes With…John Maddison, SVP, Fortinet

One topic that always comes up with we discuss the is . While there are many different ways to handle security, no one ever questions whether it’s necessary. Clearly there are different ways to implement it. For example, you could deploy a discrete solution, whereby you have security at the edge, security in , and security in all parts in between. A second method is to implement an “end-to-end” solution which covers the entire IoT. You may have guessed that I have issues with this architecture, and I voiced those concerns to John Maddison, SVP at in this week’s installment of

Topics covered in this article