For most vendors and businesses, the integration of these three pillars (Identity, Privilege, Asset) is very important. If security solutions are isolated, do not share information, or only operate in their own silo (one or two pillars), there protection capabilities are limited in scope.