This page contains a Flash digital edition of a book.
how to guide: integrated security


functionality but that easily integrates with other systems might be of more use than a tool with all the possible features and functions but which operates as a silo in the security architecture and must therefore be managed individually. However, no organisation is in a position


to throw out its existing security infrastructure and replace it with all-new, service-oriented alternatives. Besides, deploying an integrated architecture all in one go would be a project of such enormous complexity, even with standards-based APIs, that it would run a high risk of budgetary overrun or even failure. A more realistic


approach is to define programmes of work, focused on one of the pillars of the security architecture, such as user access, the network perimeter or applications. Each programme


bearing the long-term goal of an integrated security architecture in mind.


Avoiding complexity Picking off manageable programmes of work and using risk analysis to identify the areas of greatest need allows an organisation to progress towards an integrated security architecture in a sustainable fashion. However, it is important to make sure that


the process of dividing the task of building such an architecture into manageable chunks does not give rise to undue complexity. To deploy a point solution


Each programme should begin with a risk analysis to identify which particular threats the organisation is most susceptible to


should begin with a risk analysis to identify which particular threats the organisation is most susceptible to, and which of its information assets require the most protection. This risk assessment should be use to identify the areas of most pressing need of improved protection. These areas should be addressed first – all the while


6 WWW.INFORMATION-AGE.COM


for each individual security requirement, even if those solutions can be integrated via APIs, would be to maximise the deployment costs, the management complexity of the ensuing architecture and the risk that network latency will degrade the performance of the IT infrastructure.


This is the argument for using integrated security platform solutions. These allow organisations to add functionality to protect particular applications from particular threats gradually, as part of an ongoing move to an integrated security architecture, but without the risk of undue complexity and network latency.


WWW.F5.COM


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20