Corro'll (Kuh'rel) Driskell

62%
Flag icon
We need a security architecture that enables us to more quickly support new devices and provide access to a greater range of applications and data, without increasing risk. We need to be able to dynamically adjust the levels of access we provide and the monitoring we perform, depending on the security controls of the client device.
Managing Risk and Information Security: Protect to Enable
Rate this book
Clear rating