Things like whether you have perimeter-based security implemented, or if you are protected against credential theft, he said, can instantly tell you if you are doing continuous verification, and how ...