Centralized Security Outperforms Decentralized Approaches in Practice

This article compares centralized and decentralized security implementations in large application landscapes – particularly focusing on costs and organizational challenges. With a closer inspection it becomes clear that centralized security implementations have significant advantages over decentralized ones. Those advantages make it very attractive for large corporations to resist the typical tendencies of projects to deliver individual solutions.

Download