Free Sample
+ Collection
Code Files

Enterprise Security: A Data-Centric Approach to Securing the Enterprise

Starting
Aaron Woody

A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise
$26.99
$44.99
RRP $26.99
RRP $44.99
eBook
Print + eBook

Want this title & more?

$12.99 p/month

Subscribe to PacktLib

Enjoy full and instant access to over 2000 books and videos – you’ll find everything you need to stay ahead of the curve and make sure you can always get the job done.

Book Details

ISBN 139781849685962
Paperback324 pages

About This Book

  • Learn sample forms and process flows for quick and easy use
  • An easy-to-follow reference for implementing information security in the enterprise
  • Learn enterprise information security challenges and roadmap to success

Who This Book Is For

This book is intended for the IT security staff beginner to expert but would also be a valuable resource for other IT functions such as IT compliance, IT operations, and executives responsible for managing IT and information security. Understanding the principles in this book is important for decision makers as new business models are developed and enterprise security must keep up to reduce risk and secure critical enterprise assets and data.

Table of Contents

Chapter 1: Enterprise Security Overview
The façade of enterprise security
Enterprise security pitfalls
The road map to securing the enterprise
Summary
Chapter 2: Security Architectures
Redefining the network edge
Security architecture models
Summary
Chapter 3: Security As a Process
Risk analysis
Security policies and standards
Security exceptions
Security review of changes
Summary
Chapter 4: Securing the Network
Overview
Next generation firewalls
Intrusion detection and prevention
Advanced persistent threat detection and mitigation
Securing network services
Network segmentation
Applying security architecture to the network
Summary
Chapter 5: Securing Systems
System classification
File integrity monitoring
Application whitelisting
Host-based intrusion prevention system
Host firewall
Anti-virus
User account management
Policy enforcement
Summary
Chapter 6: Securing Enterprise Data
Data classification
Data Loss Prevention
Encryption and hashing
Tokenization
Data masking
Authorization
Developing supporting processes
Summary
Chapter 7: Wireless Network Security
Security and wireless networks
Securing wireless networks
Wireless network implementation
Wireless segmentation
Wireless network intrusion prevention
Summary
Chapter 8: The Human Element of Security
Social engineering
Security awareness training
Access denied – enforcing least privilege
Physical security
Summary
Chapter 9: Security Monitoring
Monitoring strategies
Privileged user access
Systems monitoring
Network security monitoring
Security Information and Event Management
Predictive behavioral analysis
Summary
Chapter 10: Managing Security Incidents
Defining a security incident
Developing supporting processes
Getting enterprise support
Building the incident response team
Developing the incident response plan
Taking action
Summary

What You Will Learn

  • Enterprise information security challenges and roadmap to success
  • Data-centric security architecture
  • Applying security through policies, standards, and processes
  • Basics of risk analysis, deciding what is valuable and needs to be secured
  • Layered security approach from data to network edge
  • Securing wireless implementations
  • Managing the human element of security through awareness
  • Security monitoring and incident management
  • Learn sample forms and process flows for quick and easy use

In Detail

Enterprise security redefined using a data-centric approach and trust models to transform information security into a business enablement process. It is a unique and forward thinking approach for deciding the best method to secure data in the enterprise, the cloud, and in BYOD environments.

"Enterprise Security: A Data-Centric Approach to Securing the Enterprise" will guide you through redefining your security architecture to be more affective and turn information security into a business enablement process rather than a roadblock. This book will provide you with the areas where security must focus to ensure end-to-end security throughout the enterprise-supporting enterprise initiatives such as cloud and BYOD.

"Enterprise Security: A Data-Centric Approach to Securing the Enterprise" will first introduce the reader to a new security architecture model and then explores the must have security methods and new tools that can used to secure the enterprise.

This book will take a data-centric approach to securing the enterprise through the concept of Trust Models and building a layered security implementation focused on data. This is not your traditional security book focused on point solutions and the network aspect of security.

This book combines best practice methods with new methods to approach enterprise security and how to remain agile as the enterprise demands more access to data from traditionally untrusted assets, hosted solutions, and third parties. Applied Information Security - A Data-Centric Approach to Securing the Enterprise will provide the reader an easy-to-follow flow from architecture to implementation, diagrams and recommended steps, and resources for further research and solution evaluation.

This book is a reference and guide for all levels of enterprise security programs that have realized that non-data centric security is no longer practical and new methods must be used to secure the most critical assets in the enterprise.

Authors

Read More