Security Basics
Name:
Email:
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Subject:
Message:
 
Re: Security design methodology Nov 02 2012 08:15PM
Alex Creek (acreek83 yahoo com)
Finding requirements first makes sense.  I can see how that would set the tone for what's needed.  Say if a company has a lot of users who connect externally, then a VPN would probably be the main driver.  

For compatibility between security systems, would it be best to just follow vendor recommend...

[ more ]  
 

Privacy Statement
Copyright 2010, SecurityFocus