O'Reilly logo

Security Monitoring with Cisco Security MARS by Greg Kellogg, Gary Halleen

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2. Regulatory Challenges in Depth

Over the past several years, organizations have been faced with many new government and financial regulations. The general theme of the regulations is to force companies to take an active stance toward the security and privacy of their data. These regulations impose a set of challenges that require you to create security policies, implement various standards, and also prove that you are following the regulatory guidelines.

Some of the requirements, or guidelines, of these regulations include the following things:

• Development and enforcement of written security policies

• Encryption using Virtual Private Networks (VPN)

• Placement of firewalls

• Monitoring of attempted logins on systems that contain ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required