Chapter 3. Deriving TCO and ROI
This chapter helps you understand the real threats in relation to Internet security. It addresses the following topics:
</feature>The first thing you need to do when deciding what security equipment to put into place to secure your network and enterprise assets is to understand the threats that can affect these assets. This can be a difficult task because there is so much fear, uncertainty, and doubt (FUD) and fiction that is communicated through television news shows, vendors, newspapers, and websites. This chapter helps you understand what the real threats ...
Get Security Threat Mitigation and Response: Understanding Cisco Security MARS now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.