O'Reilly logo

Enterprise Security: A Data-Centric Approach to Securing the Enterprise by Aaron Woody

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this chapter, we covered multiple tools that can be implemented to secure systems in the enterprise. We discussed implementation considerations and value that each tool type and method provides the enterprise. Additionally, we covered how to implement the presented tools in a manner that minimizes challenges and increases value. Tools alone are not the only method to properly secure enterprise systems; behaviors must be identified and controlled through policy. Enforcing IT security policies is a process and may include tools to a degree but will be most complied with when enforcement is observed. It is challenging to protect systems from every possible threat. This chapter focused on leveraging the trust models developed to determine ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required