Download The Business Case for Network Security: Advocacy, Governance, and ROI app to try out all the features of the app and sample a featured chapter for FREE. If you like it, you can buy the entire application and unlock all remaining chapters through the convenient in-app purchase option. The Business Case for Network Security reader application brings to your mobile bookshelf one of the best titles -- from Cisco Press a publishing imprint of Pearson Education.
ABOUT THE READER APPLICATION
Pearson has developed an iPhone app that includes all the standard features you expect in a reader such as easy navigation, search, and hyperlinking. Sample featured chapters for FREE. Like what you see, simply use the in-app purchase option to unlock the entire library application.
THE BUSINESS CASE FOR NETWORK SECURITY: ADVOCACY, GOVERNANCE, AND ROI
Understand the total cost of ownership and return on investment for network security solutions
The Business Case for Network Security: Advocacy, Governance, and ROI addresses the needs of networking professionals and business executives who seek to assess their organization’s risks and objectively quantify both costs and cost savings related to network security technology investments. This book covers the latest topics in network attacks and security. It includes a detailed security-minded examination of return on investment (ROI) and associated financial methodologies that yield both objective and subjective data. The book also introduces and explores the concept of return on prevention (ROP) and discusses the greater implications currently facing corporations, including governance and the fundamental importance of security, for senior executives and the board.
Making technical issues accessible, this book presents an overview of security technologies that uses a holistic and objective model to quantify issues such as ROI, total cost of ownership (TCO), and risk tolerance. This book explores capital expenditures and fixed and variable costs, such as maintenance and upgrades, to determine a realistic TCO figure, which in turn is used as the foundation in calculating ROI. The importance of security policies addressing such issues as Internet usage, remote-access usage, and incident reporting is also discussed, acknowledging that the most comprehensive security equipment will not protect an organization if it is poorly configured, implemented, or used. Quick reference sheets and worksheets, included in the appendixes, provide technology reviews and allow financial modeling exercises to be performed easily.