Listing 1 - 2 of 2 |
Sort by
|
Choose an application
Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon–or should be employing–in order to make reasoned decisions regarding the implementation of those features. Coverage includes multi-factor authentication, firewalls, zero-trust environments, network segmentation, remote access solutions, and the people aspects of security that are often overlooked and represent an organization’s biggest vulnerability. Chapters on the various technologies such as multi-factor authentication and zero-trust environments explain in plain English the values and benefits that each technology provides. Clear technical explanations are accompanied by business case explanations that explain the “why” of each technology and when each technology should be implemented. You will come away equipped to have business-driven discussions with your IT staff that allow for a productive balancing of the need for security with the need to do business and drive profits. You Will Learn: The importance of multi-factor authentication The limits of what multi-factor authentication can protect How firewalls are used to protect your company from attackers What zero-trust environments are and what they mean Whether zero-trust networks are what is needed to secure your own environment The security benefits from implementing a network segmentation policy The best ways to access files and resources from remote locations outside the office.
Small business --- Business enterprises --- Computer networks --- Security measures. --- Businesses, Small --- Medium-sized business --- Micro-businesses --- Microbusinesses --- Microenterprises --- Small and medium-sized business --- Small and medium-sized enterprises --- Small businesses --- SMEs (Small business) --- Business --- Industries --- Size --- Data protection. --- Risk management. --- Computer security. --- Information technology --- Microsoft software. --- Microsoft .NET Framework. --- Data and Information Security. --- Mobile and Network Security. --- IT Risk Management. --- Principles and Models of Security. --- Business IT Infrastructure. --- Microsoft. --- Management. --- Computer software --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Insurance --- Management --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Protection --- Security measures
Choose an application
Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon–or should be employing–in order to make reasoned decisions regarding the implementation of those features. Coverage includes multi-factor authentication, firewalls, zero-trust environments, network segmentation, remote access solutions, and the people aspects of security that are often overlooked and represent an organization’s biggest vulnerability. Chapters on the various technologies such as multi-factor authentication and zero-trust environments explain in plain English the values and benefits that each technology provides. Clear technical explanations are accompanied by business case explanations that explain the “why” of each technology and when each technology should be implemented. You will come away equipped to have business-driven discussions with your IT staff that allow for a productive balancing of the need for security with the need to do business and drive profits. You Will Learn: The importance of multi-factor authentication The limits of what multi-factor authentication can protect How firewalls are used to protect your company from attackers What zero-trust environments are and what they mean Whether zero-trust networks are what is needed to secure your own environment The security benefits from implementing a network segmentation policy The best ways to access files and resources from remote locations outside the office.
Production management --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- veiligheid (technologie) --- bedrijfssoftware --- bedrijfsautomatisering --- computerprogramma's --- netwerken (informatica) --- risk management --- programmeertalen --- computerbeveiliging --- mobiele communicatie --- Small business --- Business enterprises --- Computer networks --- Security measures.
Listing 1 - 2 of 2 |
Sort by
|