CA Threat Management r8.1 500-749 User 1 Year Value Maint Lic ML LP 2 ETRITM8105EM1C ユーザーズマニュアル

製品コード
ETRITM8105EM1C
ページ / 7
4
Proactive Management
Even as security and accountability requirements continue
to increase, organizations like yours must meet these
greater requirements with fewer resources. That’s why 
you need a comprehensive, integrated approach that
elevates threat management, enabling proactive security
management and accountability for both the endpoint and
the gateway. Once security takes this evolutionary step,
the benefits will be profound:
• Risk mitigation 
• Increased operational efficiencies 
• Reduced costs 
• Business continuity 
• Regulatory compliance 
An integrated approach to security also enables you to
align threat management with your business. It allows you
to proactively identify and remediate security threats,
foiling security incidents before they can impact your
business. In today’s environment, simply implementing
more security technology is a futile strategy that increases
complexity and delivers diminishing returns. The solution
is better management — not more products. 
More Products, Diminished
Returns 
Vulnerabilities, malicious code, spyware and unwanted
spam are out of control, with worm attacks alone inflicting
staggering damages. Endless patching and filtering efforts
to contain such threats strain IT resources and impact
business operations. The problem will only worsen as
threats propagate and grow in sophistication and diversity.
Attempting to deal with them through a fragmented
collection of individual point solutions is an impossibly
complex and expensive proposition because point
solutions tend to: 
• Conflict with each other 
• Require redundant efforts 
• Rarely offer any synergistic benefits 
The fundamental problem is that point solutions, no
matter how many you deploy, meet only a small piece of
the total security management challenge. Today’s threats
require a proactive stance that can best be achieved with
a unified approach to security management. 
Figure 1. The Integrated Threat Management web-based console allows administrators to
manage their antivirus and anti-spyware solutions from the same interface.