Security

The Value of Integrated Security

Download Now Free registration required

Executive Summary

Security breaches can attack a company from a wide range of sources, including the company's own networked PCs and servers. New worms and viruses also are targeting network endpoints, a situation that is of particular concern in small or branch offices with limited IT resources to combat these challenges. In the past, threats from both internal and external sources were relatively slow-moving. The first generation of security challenges in the 1980s - boot viruses affecting individual computers and networks - took weeks to spread. In the 1990s, a second generation of security challenges could spread in days, including macro viruses, email viruses, Denial-Of-Service (DoS) threats, and limited hacking attempts.

  • Format: PDF
  • Size: 360.97 KB