March 2004
Intermediate to advanced
336 pages
9h 32m
English
A self-protecting IT environment must take appropriate actions automatically to make itself less vulnerable to attacks on its runtime infrastructure and business data. These attacks—which often occur on a daily basis—can take the form of unauthorized access and use, malicious viruses that can reformat hard drives and destroy business data, and denial-of-service attacks that can cripple critical business applications. A combination of security management tools and storage management tools are necessary to deal with these threats. Security management tools can help businesses consistently enforce security and privacy policies, help reduce overall security administration costs, and help increase employee productivity and customer ...