Index

images  A

Architecture

    balanced controls

        definition

        detective and preventative

        detective controls

        firewalls system

        intrusion prevention systems

        security business intelligence

    business needs

    BYOD

    cloud computing

    employee productivity

    hardware-enforced security

    IT consumerization

    privacy and regulatory requirements

    security zones

        critical data and resources

        definition

        devices and application types

        PEPs

        selective zones

        trusted zones

        untrusted zones

        user’s device and ...

Get Managing Risk and Information Security: Protect to Enable now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.