Enterprise Security: A Data-Centric Approach to Securing the Enterprise

A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise
Code Files

Enterprise Security: A Data-Centric Approach to Securing the Enterprise

Aaron Woody

1 customer reviews
A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise
Packt Subscription
FREE
$9.99/m after trial
eBook
$18.90
RRP $26.99
Save 29%
Print + eBook
$44.99
RRP $44.99
What do I get with a Packt subscription?
  • Exclusive monthly discount - no contract
  • Unlimited access to entire Packt library of 6500+ eBooks and Videos
  • 120 new titles added every month, on new and emerging tech
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the subscription reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the subscription reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the subscription reader
$0.00
$18.90
$44.99
$9.99 p/m after trial
RRP $26.99
RRP $44.99
Subscription
eBook
Print + eBook
Start a FREE 10-day trial

Frequently bought together


Enterprise Security: A Data-Centric Approach to Securing the Enterprise Book Cover
Enterprise Security: A Data-Centric Approach to Securing the Enterprise
$ 26.99
$ 18.90
Mobile Security: How to Secure, Privatize, and Recover Your Devices Book Cover
Mobile Security: How to Secure, Privatize, and Recover Your Devices
$ 26.99
$ 18.90
Buy 2 for $37.80
Save $16.18
Add to Cart

Book Details

ISBN 139781849685962
Paperback324 pages

Book Description

Enterprise security redefined using a data-centric approach and trust models to transform information security into a business enablement process. It is a unique and forward thinking approach for deciding the best method to secure data in the enterprise, the cloud, and in BYOD environments.

"Enterprise Security: A Data-Centric Approach to Securing the Enterprise" will guide you through redefining your security architecture to be more affective and turn information security into a business enablement process rather than a roadblock. This book will provide you with the areas where security must focus to ensure end-to-end security throughout the enterprise-supporting enterprise initiatives such as cloud and BYOD.

"Enterprise Security: A Data-Centric Approach to Securing the Enterprise" will first introduce the reader to a new security architecture model and then explores the must have security methods and new tools that can used to secure the enterprise.

This book will take a data-centric approach to securing the enterprise through the concept of Trust Models and building a layered security implementation focused on data. This is not your traditional security book focused on point solutions and the network aspect of security.

This book combines best practice methods with new methods to approach enterprise security and how to remain agile as the enterprise demands more access to data from traditionally untrusted assets, hosted solutions, and third parties. Applied Information Security - A Data-Centric Approach to Securing the Enterprise will provide the reader an easy-to-follow flow from architecture to implementation, diagrams and recommended steps, and resources for further research and solution evaluation.

This book is a reference and guide for all levels of enterprise security programs that have realized that non-data centric security is no longer practical and new methods must be used to secure the most critical assets in the enterprise.

Table of Contents

What You Will Learn

  • Enterprise information security challenges and roadmap to success
  • Data-centric security architecture
  • Applying security through policies, standards, and processes
  • Basics of risk analysis, deciding what is valuable and needs to be secured
  • Layered security approach from data to network edge
  • Securing wireless implementations
  • Managing the human element of security through awareness
  • Security monitoring and incident management
  • Learn sample forms and process flows for quick and easy use

Authors

Table of Contents

Book Details

ISBN 139781849685962
Paperback324 pages
Read More
From 1 reviews

Read More Reviews

Recommended for You

Mobile Security: How to Secure, Privatize, and Recover Your Devices Book Cover
Mobile Security: How to Secure, Privatize, and Recover Your Devices
$ 26.99
$ 18.90
Software Testing using Visual Studio 2012 Book Cover
Software Testing using Visual Studio 2012
$ 29.99
$ 21.00
Augmented Reality using Appcelerator Titanium Starter Book Cover
Augmented Reality using Appcelerator Titanium Starter
$ 12.99
$ 9.10
Augmented Reality with Kinect Book Cover
Augmented Reality with Kinect
$ 16.99
$ 11.90
Cinema 4D R14 Cookbook, Second Edition Book Cover
Cinema 4D R14 Cookbook, Second Edition
$ 29.99
$ 21.00
Software Defined Networking with OpenFlow Book Cover
Software Defined Networking with OpenFlow
$ 23.99
$ 16.80