Základní info
Protecting corporate information and technology assets from intruders, thieves, and vandals is a significant challenge for most enterprises. Historically, investments in security technology were made by individual technology managers and business units in response to the specific threats they faced. CIOs are now implementing technologies that can support the centralized management and enforcement of security policy.