Architecture and Best Practices: Recommendations for the PI System
There is no “one size fits all” approach to security. How secure is secure enough? This question needs to be answered individually by each organization. Whether you are configuring security for a new PI System or reviewing security for an existing PI System, this talk will help you understand the options available for implementing the right security model. We will present various security models and discuss guidelines for creating the right model to best fit your needs, both now and as your security requirements evolve in future.