Another security concern for end-users, particularly if they must deal with an application that has internal security requirements, is one of confusion as to where they should go to handle a security problem, or to set up a new employee for computer access. This makes it advisable to consolidate all security services into a central area, from the users point of view, even if that area is actually a decentralized security area. Encouraging applications development areas to abandon homegrown security in favor of taking advantage of the CA Top Secret applications interface simplifies the security centralization effort.
If you take the time to ensure that you have taken into account the psychological needs of each area, as well as the technical requirements, your implementation proceeds more smoothly than you might expect. In fact, you may find that you are receiving assistance and support from all of these areas. This is an important step toward achieving truly effective security in your environment.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|