The ubiquitous and ever-changing technologies emerging in today's enterprise environment (cloud, social media, mobile devices, etc.) require a new perspective on enterprise security architecture (ESA). Effective enterprise risk management in this highly complex, heterogeneous, and seemingly "boundary-less" environment rests on the three pillars of information security in practice (see Figure 1):
-
Identity management
-
Security policy compliance
-
Cyber security architecture as defense