Realizing Asset-Centric and User-Centric Approaches to Security by RES SoftwareWelcome, Guest      sign in | register | help

   Search for:        Advanced Search
Research Abstract
Realizing Asset-Centric and User-Centric Approaches to Security
by RES Software

> View this now

Published on: September 18, 2009
Type of content: WHITE PAPER
Format: Unknown
Length: 8 pages
Price: FREE

In the rush to meet regulatory or customer mandates, organizations have spent millions of dollars implementing security and compliance measures either issue by issue or regulation by regulation. This has resulted in an asset-centric security approach, where we focus on the IT infrastructure and make sure that this is secure.

However, in the current versatile user community, a user is no longer bound to any single device. So, although assets still need to be kept secure, the need arises for a user-centric security approach, where security rules are aligned with the use of those assets.

This white paper presents an overview of both the asset-centric and the user-centric approaches to security. These approaches will be mapped towards the standard for Information Security: ISO 17799.

> View Company Report
> View all content by this company
> Return to Search Results

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts