3. IT Risk Management Architecture
IT Client
With endpoint protection, DLP, and NAC
IT Infra and Servers
Vulnerability
Policy Assessment Access
Enforcer Vulne Control
Threat rability
Correlation Mgt
Identity
Policy Store
Auditor Reme
Policy
diation
Store Mgt Out of Scope
Out of Scope Software Patch
Delivery Mgt
4. Traditional Security Solution Map
(disparate and inconsistent)
Monitoring
Detection Response
and Logging
Threat Management
Identity and Access Mgnt
Log Event Management
5. Modern Security Solution Map
(lean and consistent)
Monitoring
Detection Response
and Logging
Threat Management
Identity and Access
Management
Log Event Management