IT Governance, Risk, and Compliance

Jan 8 2011   12:26AM GMT

Governing IT: Policy Formulation and Enforcement – Part VII

Robert Davis Robert Davis Profile: Robert Davis

Due to the continuous adoption of new or improved hardware, firmware and software, IT threat vectors are likely to remain a business risk for the foreseeable future. Once an entity understands what information needs to be controlled and have developed a set of policies to address data protection, they can evaluate technology solutions enabled to both stop perceived threats and automatically enforce IT policies. Within this context, entities should acquire solutions that enforce IT policies while reducing risk exposure, controlling costs, and simplifying administration across the deployed IT architecture.

View Part I of the Governing IT: Policy Formulation and Enforcement series here

 Comment on this Post

There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

Share this item with your network: