The security implementation never ends. After total implementation of CA Top Secret, you may find that your use of CA Top Secret must continually adjust to reflect changes that occur within your installation. Your CA Top Secret implementation is just as dynamic as your data processing environment. It requires continual analysis, review, and modification to properly protect your installation.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|