Network Security

Enabling Endpoint and Network Security with the SANS 20 Critical Security Controls

Provided by Dell, Inc

Category Network Security

Type White Paper

Length 7

Publish Date October 28 2015

Date posted February 23 2016


Today’s technology provides a wealth of opportunity. For example, by adopting bring your own device (BYOD) policies, you can enable your employees to work from anywhere, anytime, increasing their productivity. And the ever-growing volumes of data you collect present a wealth of opportunities for data mining and business intelligence. But these market trends also represent security risks, especially given that attacks are increasing in both number and sophistication. Therefore, protecting your environment is a balancing act. Be too lax on security and you incur too much risk. But apply too much security and your users can’t do their jobs. It can seem like an impossible task, especially with limited IT staff and budget.

But it’s not. This paper details how the 20 Critical Security Controls defined by the SANS Institute will enable you to protect your IT environment while also facilitating
productivity and agility across your organization.

Recommended for You


US ‘hacking back’ law could create a cyber wild west of vigilantism

Dan Swinhoe casts a critical eye on the future


A c-suite guide to blockchain 2018

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.


Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.



If it were legal, would your organization hack back?