ABSTRACT

A solid security infrastructure consists of many components that, through proper application, can reduce the risk of information loss to the enterprise. This chapter examines the components of an information security architecture and why all the technology is required in today’s enterprise. The fact is that firewalls provide the perimeter security needed by organizations. However, left on their own, they provide little more than false assurance that the enterprise is protected. These are but a few of the risks to the enterprise the security architecture must contend with. The architecture of the security infrastructure must be aligned with the enterprise security policy. If there is no security policy, there can be no security infrastructure. Enterprises and their employees often see security as a business impediment. Consequently, they are circumvented in due course. A centralized security administration system facilitates numerous benefits, both in terms of efficiency and consistency.