A Holistic Approach to Securing the Enterprise
by Don Kleinschnit - Vice President Of Product Delivery At Symantecís Enterprise Administration Business Unit - Friday, 2 July 2004.
It is becoming increasingly clear that if we are to evolve the task of managing our infrastructure we need to manage in both the normal and disrupted states of the enterprises operation. Ideally, an organization might have a modular suite of applications that participate in the management of the transition from normal to the disruptive state and back again in a controlled and safe manner. The applications strategy is made up of five modular parts:
  • Installation Design: A virtual design environment that simplifies the creation of installation and recovery packages. The goal is to improve and reduce the amount of expertise and effort required to create an installation environment.
  • Software Provisioning and Delivery: A centralized delivery environment that automates the local and remote installation of computer operating environments.
  • Patch Management and Help Desk Operations: Local and remote operations that assure the currency of software and automate problem management.
  • Asset Management: This is one piece of the lifecycle that is often taken for granted, but is an important foundation. Auto-discovery, inventory, software usage and license monitoring, plus disposal, repurposing and reporting are elements of the asset management used by most of the applications in this set.
  • Protection, Recovery, and Archive: A hardware-independent, local and remote, automated backup, recovery, and archive environment. IT needs the ability to get to full working condition in a short period of time.
A holistic strategy will allow IT organizations to become more efficientópersonnel will have more time to focus on important projects, rather than dealing with urgent security issues. By involving all relevant IT and management groups with a common goal of securing the enterprise, the solution becomes fully integrated, rather than fragmented. The benefits are numerous, including increased security and availability, reduced human intervention, competitive advantage through rapid response to change and improved governance and compliance.

By implementing a scalable, platform-independent architecture, that addresses security, storage and systems management, IT will find it much easier to stay on top of that checklist.

"The only truly secure infrastructure is a managed infrastructure!"

Spotlight

How to talk infosec with kids

Posted on 17 September 2014.  |  It's never too early to talk infosec with kids: you simply need the right story. In fact, as cyber professionals itís our duty to teach ALL the kids in our life about technology. If we are to make an impact, we must remember that children needed to be taught about technology on their terms.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Sep 19th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //