Best Practices for Implementing a Security Process

  • Source: Symantec
  • Written By:
  • Published:
  • (Originally Published On:) )
Security technology has evolved from static firewalls and antivirus products to suites of tools that are effective in protecting against modern threats. But without a solid process backing up the technology, organizations will still be susceptible to emerging threats. Learn more about aligning security processes with the latest security technologies to create a barrier against today’s most insidious threats.

Featured Software Research:

Benchmarking Your Quality Maturity: Turning a Cost Center into a Profit Center

To help organizations understand their current state and plan for managing quality, LNS Research covers a quality management research study of more than 1,000 manufacturing organizations to identify best practices in organizational change, business process redesign, and technology evaluation. Read More

Guide to IT Best Practices in Application-Aware Network Performance Management

Businesses are constantly striving to do more with fewer resources, and information technology (IT) departments are subject to the same pressures. They must contend with a growing number of applications and an increasingly complex infrastructure. The IT department’s arsenal includes tools for monitoring network, application, server, database, and end user performance, but typically they are not integrated with each other. That means that it’s end users who are detecting poor application performance,... Read More

Top 10 SIEM Implementer’s Checklist: Operationalizing Information Security

This e-book lists 10 best practices for successful security information and event management (SIEM) implementation. These best practices are intended to help enterprises optimize their resources and accelerate their return on investment (ROI).

An organization may need to streamline incident response, automate audit and compliance processes, better manage security and business risks, or build out a deployed SIEM. This document presents process, metrics, and technology considerations relative... Read More

You may also be interested in these related documents:

Best Practices in Authentication and Access Control: Comparing 802.1x to the Nevis LAN Security Approach

The 802.1x protocol should be the obvious choice when implementing user-based authentication in enterprise networks. So why doesn’t everyone use it? Because it doesn’t give a complete solution for authentication and policy requirements, even when it’s integrated with a network access control (NAC) solution. But if you integrate 802.1x with a local area network (LAN) secure switch, you get a more complete secure solution. Read More

Network Security Best Practices: Competitive Analysis

When it comes to security architecture, choosing a system that’s scalable and applicable to a broad set of security needs is a wise move. New security services for Internet protocol (IP) networks are emerging that enable new levels of scalability and manageability—while remaining completely transparent to the network. By applying this type of system, you build an optimal framework for future security applications. Read More

E-Policy Best Practices

This business guide by ePolicy Institute and EdgeWave Inc. provides best-practices guidelines for developing and implementing effective workplace e-policies, and in the process, creating clean, compliant, safe and secure electronic communications that are less likely to trigger a workplace lawsuit, regulatory investigation, security breach, or other electronic disaster. Read More
 
comments powered by Disqus