Applying Decision Models to Resource Allocation in Network Security

by Soumyo Moitra

Making effective decisions regarding the allocation of resources for network security is a key part of business today. This Executive Report focuses on the relevant issues, including a number of questions that require special attention from CIOs and chief security officers (CSOs). The report presents the questions to be asked, offers ways of answering them, and provides recommendations on how security decisions and network security can be improved.

To continue, please log in:


Retrieve your password
This document is available to Cutter Consortium Resource Center clients only. If you would like further information about how to become a client, please contact us at +1 781 648 8700 or sales@cutter.com, or you can Request Guest Access.
Applying Decision Models to Resource Allocation in Network Security07 November 2011

Become a Member

Research and inquiry privileges, plus regular strategy meetings with Cutter's Business Technology Strategies experts are just some of the perks! Plus, CIOs can upgrade to include Cutter's CIO Suite. Talk to Cutter today about trial membership, including access to research, webinars, podcasts, white papers and more.

Request trial membership