Network Security: The Business Value Proposition
by Jim Cavanagh
Network security has long been the domain of the technologist, spy and hacker. Increasingly, however, management is realizing that network security has its own unique value within the business framework and that a successful security program is subject to the same evaluations and criteria as any other operational part of their business.
This white paper looks at the key elements of the security value proposition common to most organizations.
This research report is reproduced by special arrangement with our partner, The Consultant Registry.
About the author:
James P. Cavanagh has been intimately involved with sales, marketing, engineering, public and private network design, installation and training of ATM, Frame Relay, IP, and DSL since their early commercialization. In the area of traditional consulting, Mr. Cavanagh boasts a long list of recognizable manufacturers in the emerging IP networking arena, as well as traditional telephony, carriers and service providers, and end-user organizations. Mr. Cavanagh has helped his clients with everything from product specification to network procurement, design, integration, installation and engineering.
Mr. Cavanagh is the editor of books on multimedia networking and network security, as well as author of Frame Relay Applications: Business and Technology Case Studies. He is currently writing a book on optical networking, and starting a new web site covering domestic US and International telecom regulatory and legal issues. Mr. Cavanagh is also a frequent guest on panels at industry conferences, has been an instructor for the International Communications Association's (ICA) Summer Program at the University of Colorado at Boulder since 1992. Additionally, Mr. Cavanagh also provides training on ATM, Frame Relay, Emerging Technologies, LAN and TCP/IP Integration, Telecom and Datacom Fundamentals and a variety of other subjects.
Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information. Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site. Please encourage colleagues to download their own copy after registering at http://www.webtorials.com/reg/.