Summary

In this chapter, we covered multiple tools that can be implemented to secure systems in the enterprise. We discussed implementation considerations and value that each tool type and method provides the enterprise. Additionally, we covered how to implement the presented tools in a manner that minimizes challenges and increases value. Tools alone are not the only method to properly secure enterprise systems; behaviors must be identified and controlled through policy. Enforcing IT security policies is a process and may include tools to a degree but will be most complied with when enforcement is observed. It is challenging to protect systems from every possible threat. This chapter focused on leveraging the trust models developed to determine the best balance of security and risk when implementing a system protection strategy. Protecting systems in the enterprise is process and technology working in unison with the oversight of a skilled IT team to apply action. The next chapter covers the subsequent security architecture layer, which is securing enterprise data.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.139.70.21