Previous Topic: Basis for the CA Top Secret Implementation PlanNext Topic: Implementation Requires Adequate Support


CA Top Secret is a Means to an End

Your environment is not secure immediately after installing CA Top Secret. Rather, it is the tool used to build a secure data processing installation. Therefore, each installation must plan and design their security implementation to conform to the needs of their environment. Much work is involved in implementing any security package, and this work is not entirely technical.