To ensure availability whilst controlling risk, enterprises need to adapt quickly to business digitalization and new IT models. However, there is a clear business impact that evolves from managing endpoint security and configuration and many businesses are still uncertain about the best way to set up their IT organizations. Security Configuration Management exists at the point where IT security and IT operations meet to ensure systems are properly configured and security and compliance standards are met. This white paper works as a buyer’s guide, detailing what to look for in a configuration management tool.
Phil Muncaster reports on China and beyond