Evaluate Weigh the pros and cons of technologies, products and projects you are considering.
This article is part of our Essential Guide: An IT security strategy guide for CIOs

Enterprise security architecture: Technology overview


Craft a plan: Enterprise information security architecture

Source:  Christopher Seero
Designer: Linda Koury/TechTarget

When it comes to creating an IT security roadmap, there are several technology areas to consider. In a recent SearchCIO webcast, Johna Till Johnson discussed the nuances of enterprise information security architecture and infrastructure. CIOs and IT security professionals have a lot to think about when it comes to crafting a solid plan.

First, there is understanding next-generation security technology: What does it do, and why does the company need it? Then, there is the vendor piece: Who makes it? Finally, where is the technology headed?

In this photo story, click through to get Johnson's recommendations for secure Web gateways; next-generation firewalls; data leakage protection; advanced security analytics; user behavior analytics; and threat, compliance and risk network tools. Follow through the end to get additional advice and important conclusions.

This story is the final piece of a four-part webcast on next-gen security and enterprise information security architecture. On each slide page, find the audio for this segment. Then, go back and listen to Johnson's advice for combating cyber weaponry, crafting a better security roadmap and managing a risk portfolio.

View All Photo Stories

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

What is on your must-have list of enterprise information security architecture?