Back to list
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Re: Security design methodology
Nov 02 2012 08:15PM
Alex Creek (acreek83 yahoo com)
Finding requirements first makes sense. I can see how that would set the tone for what's needed. Say if a company has a lot of users who connect externally, then a VPN would probably be the main driver.
For compatibility between security systems, would it be best to just follow vendor recommend...
[ more ]
Copyright 2010, SecurityFocus