Implementing Policy and Control


                                                                               Steve Mul...
What IT Needs to Control Has Changed

• Before, “applications” were well-understood.
      Network utilities, OLTP
  -

  ...
Implementing Policy and Control
Implementing Policy and Control
Implementing Policy and Control
Implementing Policy and Control
Implementing Policy and Control
Implementing Policy and Control
Implementing Policy and Control
Implementing Policy and Control
Upcoming SlideShare
Loading in …5
×

Implementing Policy and Control

811 views

Published on

There is general agreement that IT organizations need to implement control functions in the IT infrastructure in order to both improve application performance and to provide enhanced security. There is also general agreement that IT organizations require the capability to set policy in an automated fashion. There is, however, wide disagreement as to what type of control functions need to be implemented, where they need to be implemented, and just how automated and granular the policy capabilities need to be. Explore these issues and learn how to create a company policy and control strategy.

Published in: Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
811
On SlideShare
0
From Embeds
0
Number of Embeds
14
Actions
Shares
0
Downloads
41
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Implementing Policy and Control

  1. 1. Implementing Policy and Control Steve Mullaney Vice President, Marketing Page 1 | © 2007 Palo Alto Networks. Proprietary and Confidential
  2. 2. What IT Needs to Control Has Changed • Before, “applications” were well-understood. Network utilities, OLTP - Internally-developed enterprise client server - Known behavior, studied risks, predictable - Power users are rare - • Now, “applications” are likely to be employed by users for months before IT hears about them Collaboration, media, interactivity - Externally-sourced, browser-based, Web 2.0 - Unknown behavior, unknown risks, unpredictable - Everybody is a power user - Both Applications and Users Have Evolved

×