Back to list
*Note: Email address will appear as "user domain ext" to prevent harvesting.
RE: Security design methodology
Nov 05 2012 06:59AM
Dave, Manish, R. - ESIL \(MUM\) (Manish Dave essar com)
I feel it's not more than a marketing gimmick to sell UTM device. I fully agree with Terence that vendor recommendations are biased. I would recommend adherence to a framework custom designed for your organization's business type. Take feeds from 'Cobit 5 for Information Security' and SANS Top 20 co...
[ more ]
Copyright 2010, SecurityFocus