July 18, 2019 | Faculty Reports | Endpoints | By Justine Bone, IANS Faculty
Moving from a flat topology to a zoned network takes organization and analysis, but it can dramatically improve an organization’s security. This report helps steps you through the process.
The Zero Trust vendor bandwagon is spilling over and organizations can’t keep up. They need help understanding which technologies fit into the concept and how best to configure them.
A configuration management database (CMDB) is an inventory of hardware and software assets. This report outlines how CMDBs work, including their specific benefits and some common pitfalls to avoid.