Your environment is not secure immediately after installing CA Top Secret. Rather, it is the tool used to build a secure data processing installation. Therefore, each installation must plan and design their security implementation to conform to the needs of their environment. Much work is involved in implementing any security package, and this work is not entirely technical.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|