Enterprise Security Architecture
In this chapter, you will
• Examine configuration management concepts
• Study data sovereignty and protection methods
• Examine a wide range of technologies used in architectures to protect data
• Examine methods utilized to protect data, including site resiliency and data deception techniques
Enterprises are different from simple single computers. When you have multiple systems that work together, there are architectural concerns to ensure that the elements can reliably and safely work together. Enterprise architects are all about establishing and following a standardized form for their systems, defining configurations and interfaces so that systems can work together. Numerous options are ...