An unprecedented wave of security breaches has led to the establishment of technical standards, IT governance frameworks and laws designed to improve and enforce IT security. Companies are under increasing pressure to control their IT infrastructures more effectively. Learn how ongoing automated vulnerability assessments, together with well-defined network security policies, can simplify the compliance process.
integration maturity model it
the Capability Maturity Model Integration (CMMI) as a way of assessing the status of security processes. ISO 17799:2005 (ISO 27001) '' This is an international standard for the management of IT security that organizes controls into ten major sections, each covering a different topic or area. These are: business continuity planning, system development and maintenance, physical and environmental security, compliance, personnel security, security organization, computer operations and management, asset control