physical & logical security convergence - powered by enterprise security management

593 237 0
physical & logical security convergence - powered by enterprise security management

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

[...]... today’s information security challenges Recognized as an expert in the field of IT security, Colby’s primary areas of focus are insider threat, the convergence of physical and logical security, as well as enterprise security and information management As the leader of ArcSight’s Technical Marketing team, Colby drives content for customers to more easily identify and solve complex real-world issues He has... Security Convergence 60 A Three-Pronged Approach 61 Functional Convergence Drives Security Solutions 68 Mobile Malware 70 Security Convergence Is Changing the Security Culture 72 xv xvi Contents The Convergence Role in Accelerating Security Solutions Worldwide 77 Security Convergence. .. Protocol (IP)-based security architecture that is state-of-the-art A comprehensive approach to logical and physical security requires both a political and a social will, as well as enterprising leadership This is not only a difficult and complex task, but also one that requires a coordinated buy-in from all levels of management In addition, it requires a commitment to integrate and deploy leading-edge solutions... vulnerability, whether in physical security or logical security systems IP convergence gives us another way to achieve this defense in depth besides deploying increased layers of defense, and that is the use of correlation of security events to gain additional insight into attacks that might otherwise not be detectable The use of Enterprise Security Management (ESM) or Security Information and Event Management (SIEM)... CISSP—Chief Security Officer, ArcSight Inc has over a decade of real-world security engineering and management expertise developed in some of the most sensitive and mission-critical environments in the world As ArcSight’s CSO he advises government organizations and Global 1,000s on security strategy related to Enterprise Security Management (ESM) solutions while being an evangelist for the security space... basis for a “Trusted Enterprise found that many CXOs (the half dozen most-senior officers of an enterprise, such as the CEO, CFO, and CIO) were not interested in discussing security as a major concern of their jobs.To them, security was what guards do Some, who were more connected to their CIOs, thought of security as the role played by chief security officers (CSOs) or chief information security officers... 258 ESM at the Center of Physical and Logical Security Convergence 259 Common Access Cards and In-House Security Monitoring 261 ESM Deployment Strategies 263 Standard ESM Deployment 263 High-Availability and Geographically Dispersed ESM Deployments 268 The Convergence of Network Operations and Security Operations 271 People... Change 179 The Emergence of the CIO and Its Impact on Security Convergence 183 Conclusion 187 Chapter 7 Positioning Security: Politics, Industry, and Business Value 189 Twenty-First-Century Risk: Physical and Electronic Security Collaboration 190 Homeland Security 193 RAMCAP... Positioning Security with the Board 217 Video Surveillance: A Benchmark for Security ROI 219 The Security Scorecard 221 Positioning Security: The “I” Word 223 xvii xviii Contents Chapter 8 The New Security Model: The Trusted Enterprise 225 How Wall Street Funded the Global Economy:Twenty-First Century Security. .. or Security Information and Event Management (SIEM) to correlate security events across the entire spectrum of network, application, and logical security events is a promising area of advancement in security systems.You also can use ESM to correlate physical security events identified by video analytics, sensors, and guards and to cross-correlate all of these events against very complex business rules . IMWQ295T6T PUBLISHED BY Syngress Publishing, Inc. Elsevier, Inc. 30 Corporate Drive Burlington, MA 01803 Physical and Logical Security Convergence: Powered By Enterprise Security Management Copyright © 2007 by. Intelligence Director, Cyveillance ii Physical & Logical Security Convergence takes an in-depth look at how the issue of convergence is impacting enterprise security, particularly from the insider threat. insider threat, the convergence of physical and logical security, as well as enterprise security and information management. As the leader of ArcSight’s Technical Marketing team, Colby drives content

Ngày đăng: 25/03/2014, 11:58

Tài liệu cùng người dùng

Tài liệu liên quan