Skip to main content

Session 4: Transitioning to the IoE

Completion requirements
View all sections of the document

The figure provides information about security architecture. Across the top are the headings Unmatched visibility, Consistent control, Advanced threat protection, Complexity reduction. Beneath each of these respectivley are phrases, 'Global intelligence with the right context', 'Consistent poloicies across the data network and data centre', 'Dtects and stops advanced threats'; 'Fits and adapts to changing business models'. Beneath this are three cogs forming the attach continuum with labels: 'BEFORE: Control, Enforce, Harden'; 'DURING: Detect, Block, defend'; AFTER: Scope, Contain, Remediate'.

 4.3.3 Security architecture