Pro+ Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
June 2006

Reworking Risk Policy

Whether you manage policies manually or use automated tools, it is imperative to get your policies and systems in sync. More information from our sister site SearchSecurity.com Attend our live webcast on June 22 at noon ET and learn smart strategies for evaluating policy management tools. Learn how security policy tools can help – and hinder – SOX compliance efforts. In a way, your information security operation is like a crew boat. It operates most efficiently and effectively when everything is in harmony. To make sure the metaphorical oars all hit the water at the exact same time, you need to establish some rules. Forget about a coxswain; sound policies and strong management systems steer your crew. Part of managing risk requires periodically evaluating your policies and your enforcement program, and updating the guidelines and technology that ensure employee and system adherence to them. Similarly, vendors now offer products that can convert policies into specific configuration criteria and commands. Policy management isn't ...

Access this Pro+ Content for Free!

By submitting you agree to recieve email from TechTarget and its partners. If you reside outside of the United States you consent to having your personal data transferred and processed in the United States. Privacy Policy

Features in this issue

Columns in this issue

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

-ADS BY GOOGLE

Close