Introduction

Successful deployment of technology requires a thoughtful architecture that deploys tools in a calculated manner. Unfortunately, it's possible to invest large amounts of money in this area and yet produce little or no results.

Your company might have invested in the most secure firewall product available; however, if your staff doesn't configure the device correctly, it won't protect your assets. In fact, it might contribute to the threat. Poorly implemented technological solutions are often the source of many security issues. It is much more important to deploy a few products successfully than to attempt to implement all possible security products at your company.

Get Executive Guide to Information Security, The: Threats, Challenges, and Solutions now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.