Security Configuration Management: Moving from Praise to Results

A whole host of industry recognized sources, including Gartner, Securosis and SANS have been consistently recommending security configuration management (SCM) as one of the top, if not the top, security controls you can implement to protect your IT infrastructure and data. Surprisingly, even though most organizations agree on its value, few have actually implemented SCM. Why not?

In this paper, we highlight what these industry-recognized sources are saying about SCM. We also examine the barriers that prevent organizations from implementing it—in spite of their knowledge that it’s one of the most effective and critical security controls. Then we explain how organizations can overcome these barriers to implementation by seeking out solutions that include specific capabilities.