Skip to main content

Protecting Critical Assets

  • Chapter
  • First Online:
Book cover Building a Comprehensive IT Security Program
  • 1218 Accesses

Abstract

Throughout the remainder of this book, we will operate under the central premise that every organization across the globe has too much information flowing throughout their environment for it to be feasible to monitor the content and context of everything that is transferred. Due to the volume of electronic information, should an organization choose to attempt monitoring of every transmission, half or more of the organization’s staff would be dedicated to the effort. If it is, in fact, infeasible to monitor everything, how do we separate the wheat from the chaff? Content and content aware tools have become indispensable for organizations to identify, monitor, and protect what is most important to them, but many struggle to use them effectively.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Jeremy Wittkop

About this chapter

Cite this chapter

Wittkop, J. (2016). Protecting Critical Assets. In: Building a Comprehensive IT Security Program. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2053-5_2

Download citation

Publish with us

Policies and ethics