Best practices for implementing data security

By on

In recent years, enterprise security spending has focused primarily on firewalls, intrusion prevention, spam filtering and antivirus products, all designed to protect organizations’ IT boundaries.

Security priorities are now evolving from creating fortified stand-alone islands, to enabling heterogeneous networks to store and securely exchange data with internal and external parties across distributed computing platforms. This shift in emphasis from solely perimeter-based security has been ...

Hi! You've reached one of our premium articles. This is available exclusively to subscribers.

It's free to register, and only takes a few minutes.

Once you sign up you'll have unlimited access to the full catalogue of Australia's best business IT content, as well as a daily news bulletin delivered straight to your inbox.

Register now
Copyright © SC Magazine, US edition

Most Read Articles

Most popular tech stories

Log In

|  Forgot your password?