Manage Learn to apply best practices and optimize your operations.

How to manage a total security package

Learn how to manage a total security package within an organization; who is responsible for overseeing the process and what it takes to effectively fulfill one of these roles.

I'm a systems engineer and am interested in moving to infosec. Ideally, I would like to be part of a group involved in managing a total security package or one that deals with all aspects of this field. Does this position exist, or is it typically broken up into different technology-based areas such as network, ID, application, etc?

While I am not 100% clear you what are referring to when you state, "managing a total security package," but these positions do exist.

A CISO or CSO has to "manage a total security package" within an organization, which includes technology, policies and procedures, personnel, business processes and more. A person who will effectively fulfill one of these roles has to be extremely well-rounded in all aspects of security and motivated to continually learn and be challenged.

Since you are a systems engineer, you may be referring to a "total security package" as a holistic technical security environment. This environment would consist of access control technologies, firewalls, IDS/IPS, antivirus and more. A security administrator would be responsible for managing this type of environment, which to be clear, is different than a network administrator. A security administrator is more concerned with who is accessing company assets and what they are allowed to do with those assets. On the other hand a network administrator is responsible for monitoring the availability of the network -- the nodes and devices that make up the network -- and has to ensure that it is always up and running and performing properly.

While the security team can be made up of individuals who specialize in specific technologies and applications, the security administrator has to understand all of them, and has to ensure that they all work together in a synergist manner.

This was last published in February 2006

Dig Deeper on Network Access Control technologies

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.