Abstract

Enterprise Security Management (ESM) is defined simply as the process of controlling configuration, deployment, and monitoring of security policies across heterogeneous platforms and disparate security products. This chapter discusses what ESM is, how it works, and when and where it should be used. In some cases, ESM is not necessary, and in others, it is mandatory. In addition, it discusses some features of ESM and how it can make a job easier and effective. Lastly, it discusses some ESM tools currently available in the market. It examines each component of ESM and defines exactly what is involved in this process. The information presented in this chapter helps in deciding whether ESM is fit for an organization or not, and helps in implementation of this process. The most common cause for the need of ESM is the existence of security problems and threats. The need to protect an organization and its assets drive the need for security in general. The process of ESM includes more than just examining data from systems. Again, ESM is the process of controlling configuration, deployment, and monitoring of security policies across heterogeneous platforms and disparate security products.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.