Part IV
Securing Each Smart Device
In this part . . .
It’s time to roll out the policies, programs, and technologies to encrypt, protect, and back up the devices in your network. We walk down the thorny road together until you’re comfortable being in charge of access and control.
Chapter 9 gives an overview of everything you can do. Chapter 10 tells you about device-based solutions, and Chapters 11, 12, and 13 suggest solutions you can implement both on the device (hard), in the brain of the device user (harder), or system-wide using the network tools in your arsenal (easy). AcmeGizmo is doing it, and doing it right, so catch the case study in the chapters.
You’re just a few chapters away from reclaiming your network’s integrity.