Previous Topic: Directory Mapping for Hierarchical Policies

Next Topic: Securing Applications Using EPM

Enterprise Policy Management

This section contains the following topics:

Securing Applications Using EPM

How to Create Application Security Policies

Administrative Rights to Create Application Security Policies

EPM Use Cases for Protecting Applications

Advanced Policy Components for Applications


Copyright © 2010 CA. All rights reserved. Email CA about this topic