security
reference guide
Keep information
confidential, intact and
accessible when threats emerge.
The Right Technology. Right Away.®
CDW.com/securityguide | 888.509.4239
security
01
The Current Security Threat Environment .................... 3
	
	
•	New	Approaches	—	Traditional	Threats
	
	
•	A	New	Security	Focus	—	Data
02
Risk Assessment and Compliance ................................ 5
	
	
•	Determining	Risk
	
	
•	The	Process	of	Assessing	Risk
	
	
•	Compliance	Considerations
	
	
•	Security	as	a	Process
03
Threat Prevention.......................................................... 9
	
	
•	Reducing	Risk
	
	
•	Multilayered	Security	Approaches
04
Data Leakage Prevention ........................................... 13
	
	
•	Data	Leak	Opportunities
	
	
•	Removable	and	Portable	Media	
05
Secure Remote Access ................................................ 25
	
	
•	Varieties	of	Remote	Access
	
	
•	Threats	to	Remote	Access
06
Endpoint Security ........................................................29
	
	
•	Varieties	of	Endpoints
	
	
•	Threats	to	Endpoints
Glossary
.....................................................................................33
index
.....................................................................................35
At	CDW,	we’re	committed	to	getting	you	
everything	you	need	to	make	the	right	
purchasing	decisions	—	from	products	
and	services	 to	 information	about	 the	
latest	technology.	Our	Reference	Guides	
are	designed	to	provide	you	with	an	in-
depth	look	at	topics	that	relate	directly	
to	the	IT	challenges	you	face.	Consider	
them	 an	 extension	 of	 your	 account	
manager’s	 knowledge	 and	 expertise.	
We	 hope	 you	 find	 this	 guide	 to	 be	 a	
useful	resource.
WhAT iS A CDW
REfEREnCE
GuiDE?
TAbLE	OF	CONTENTS cHapter
reference Guide
SECuRITy
ThreaT environmenT
The CurrenT SeCuriTy
CHAPTER 1:
New Approaches — Traditional Threats
A New Security Focus — Data
CDW.Com/seCurityguiDe 3
For better or worse, the security field changes rapidly. It d