thegalaxyboy
IS-IT--Management
Hello,
What sort of policies would systems security staff recommend in an environment where a IPS device is deployed. For example, say an attack has been detected - what policy and procedure would you recommend to have in place for this?
Thanks.
What sort of policies would systems security staff recommend in an environment where a IPS device is deployed. For example, say an attack has been detected - what policy and procedure would you recommend to have in place for this?
Thanks.