Security Basics
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Re: Security design methodology Nov 02 2012 08:15PM
Alex Creek (acreek83 yahoo com)
Finding requirements first makes sense.  I can see how that would set the tone for what's needed.  Say if a company has a lot of users who connect externally, then a VPN would probably be the main driver.  

For compatibility between security systems, would it be best to just follow vendor recommend...

[ more ]  

Privacy Statement
Copyright 2010, SecurityFocus