Branch Office Server Security for Enterprise Administrator

Here we explain how a Branch Office Server Security is playing a vital role for a Enterprise Administrator.
By: Javed Shah
 
Dec. 22, 2011 - PRLog -- The branch office should initially be considered inherently unsecure, both physically and
electronically. It is a mistake to make assumptions about any level of security until the site has been physically inspected and a comprehensive security policy and program has been defined and implemented specifically for each branch office. Unfortunately, what you’ll probably discover is that the information technology component of the branch office is understaffed,under-budgeted, unplanned, and unmonitored.

http://www.itbolts.com

The pressing need for the security policy and resulting program should be driven by senior management’s security posture for the enterprise. The security policy should include disaster recovery planning and business continuity planning and should address every law and regulation with which the company must comply.

http://www.itbolts.com/courses/mcitp

Implementation and maintenance of security for the branch office should be the responsibility of an entity other than the IT administration. The security professional and the IT administrator have common concerns, up to a point. The point where they diverge is the one at which you realize that IT’s philosophy is “Availability at all cost!” and the security professional’s philosophy is “If it isn’t secure, pull the plug.”

Although the security professional is responsible for the overall security of the branch office,the security professional will usually be located in a distant office, typically HQ. It is the responsibility of local administration and management to become the enforcer of the security policy and program that is handed down from the security professional’s team. They are the ones with intimate knowledge and vision of the people, procedures, and structure of the branch office. Although the protection of the confidentiality, integrity, and availability of valuable information assets will be the major content of this lesson, the primary consideration for the security program is human safety. People come first; the issue of protecting the assets of the enterprise immediately follows.

Ref: Microsoft Self Paced 70-647 by Microsoft Press

# # #

We pro­vide high qual­ity Microsoft train­ing for those wish­ing to be cer­ti­fied in the fol­low­ing fields
End
Source:Javed Shah
Email:***@itbolts.com Email Verified
Zip:E7 8BD
Tags:Server Security Enterprise Administrator, Branch Office Security
Industry:Computers, Education, Internet
Location:London City - London, Greater - England
Account Email Address Verified     Account Phone Number Verified     Disclaimer     Report Abuse
It Bolts News
Trending
Most Viewed
Daily News



Like PRLog?
9K2K1K
Click to Share