Technology—Strategy

After you have determined which critical assets you want to protect, you can determine the appropriate technology to deploy. Technology is a key component of your information security program. You can use it to enforce your security processes and guide employee behavior. Technology is important, but no matter how good it might be, it won't overcome weak processes or weak security personnel. If you don't have the people and processes in place, you don't need the technology.

This section begins with a review of your overall technology architecture and builds upon the concepts that were introduced in the previous chapter. Individual technology components are reviewed, along with practical suggestions for deploying these devices ...

Get Executive Guide to Information Security, The: Threats, Challenges, and Solutions now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.