BestITDocuments recommended security strategy leverage’s in-place security technologies and processes for the initial portal and taxonomy activities and then incrementally phases in enhanced security functionality as the portal and taxonomy expand to support other business needs, IT projects, and user communities. The security process will be mapped to industry and government best practices and focus [...]
↧