Self-Protecting

A self-protecting IT environment must take appropriate actions automatically to make itself less vulnerable to attacks on its runtime infrastructure and business data. These attacks—which often occur on a daily basis—can take the form of unauthorized access and use, malicious viruses that can reformat hard drives and destroy business data, and denial-of-service attacks that can cripple critical business applications. A combination of security management tools and storage management tools are necessary to deal with these threats. Security management tools can help businesses consistently enforce security and privacy policies, help reduce overall security administration costs, and help increase employee productivity and customer ...

Get Autonomic Computing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.