Premium Content

Access "Integrated change management reduces security risks"

Diana Kelley and Ed Moyle Published: 20 Oct 2012

Networks and data centers are in constant flux. In large organizations, it's rare for a day to go by where we don't need to provision new servers or users, upgrade critical systems, patch databases, change firewall rules or update Web applications. But while change is a natural and necessary part of network growth, unmanaged change can quickly lead to chaos that exposes critical data and resources to attack. To prevent exposure, change management systems and procedures are implemented to help companies ensure that policies and approvals are met before a change to the system is implemented. But simply putting a change management process in place is not sufficient. As Pete Lindstrom, research director of Spire Security explains, "If you are creating a change management process because you don't want anything to change, you are missing the point." Rigid, poorly implemented change management processes can be perceived as gating factors covered in red tape that slow growth and impede work. Done correctly, change management integrates seamlessly into the ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Strategies for a successful data protection program
    data_protection_2014.png
    E-Handbook

    Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...

  • Devices, data and how enterprise mobile management reconciles the two
    ISM_supp_1014.png
    E-Zine

    The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...

  • Putting security on auto-pilot: What works, what doesn't
    security_auto-pilot.png
    E-Handbook

    For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...