Information Security Management Handbook

  • Monitor I
N/ACitations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

Integrated threat management (ITM) is the evolution of stand-alone security products into a single, unifi ed solution that is generally cheaper and easier to implement and maintain. Combine a single console for management, updates, reports, and metrics, and you will wonder why you do not have one at home too. T is chapter will introduce what an ITM solution is, the benefi ts and drawbacks of the solution, what to look for, and how to select a solution. Finally, the chapter will wrap up with some lessons learned to help avoid some of the common pitfalls and gaps in a typical ITM solution.

Cite

CITATION STYLE

APA

Monitor, I. (2000). Information Security Management Handbook. Information & Security: An International Journal, 4, 117–120. https://doi.org/10.11610/isij.0410

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free