Download now Free registration required
The conventional wisdom in IT threat mitigation is to build a layered "Defense in-depth" approach with security technology such as firewalls, IPS, network access control, anti-x client software, alarm aggregation and event correlation, etc. And while the layered approach to defense is a useful threat mitigation strategy, the threat landscape has changed, forcing conventional wisdom to shift toward a systems approach to protecting corporate assets.
- Format: PDF
- Size: 161.6 KB