Security Virtualization: Re-architecting the Appliance Mentality
sponsored by Crossbeam Systems

In order to determine what "security virtualization" really means, it is useful to understand how companies define and enforce their security and accompanying compliance policies today. In defining a security policy, companies must identify what it is that they want to protect. Some assets and communications are more important than others. For example, a set of print servers on one segment of the network may not require stringent security protections; however, when data is extracted from a finance database, a much stricter set of conditions is likely to apply. Thus, the security policy becomes the set of business rules by which processes, people and technology are applied to affect asset protection goals.
(THIS RESOURCE IS NO LONGER AVAILABLE.)
 
See what other users are reading via our Daily Top 50 Report
.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement