Missing the Forest for the Trees: Four Key Factors Often Overlooked in Server Security
In recent years, IT professionals have come to recognize the value of a disciplined approach to change control in the data center. At the same time, security pros continue to see value in preventive change controls such as whitelisting that can keep attacks from having an impact. As these two perspectives converge, IT security and operations professionals alike are seeing increased value in the application of preventive change control to servers.
In this paper, Enterprise Management Associates (EMA™) analysts take a look at four key aspects that too often get overlooked in server management and security:
- Preventive change controls such as whitelisting are often focused on the endpoint. The data center — where high-value assets often “live” — may be even more amenable to such a disciplined approach.
- Servers can be exploited to enable an attack — even when they are not the primary target.
- Monitoring is not prevention!
- Server change controls provide a lot more than enforcement. They also provide vital information.
The comprehensive value of preventive change control for servers is examined, with guidance for IT professionals on the benefits of an approach that closes the loop on server change discipline that enhances IT Service Management (ITSM) and security alike.
If you experience technical problems during registration, please notify us at firstname.lastname@example.org or by calling (512) 592-4100. Please include the document title and internet browser, version, and OS in your message.