Part IV

Securing Each Smart Device

9780470927533-pp0401.eps

In this part . . .

It’s time to roll out the policies, programs, and technologies to encrypt, protect, and back up the devices in your network. We walk down the thorny road together until you’re comfortable being in charge of access and control.

Chapter 9 gives an overview of everything you can do. Chapter 10 tells you about device-based solutions, and Chapters 11, 12, and 13 suggest solutions you can implement both on the device (hard), in the brain of the device user (harder), or system-wide using the network tools in your arsenal (easy). AcmeGizmo is doing it, and doing it right, so catch the case study in the chapters.

You’re just a few chapters away from reclaiming your network’s integrity.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset