We have nuclear power plants so we have to stay in compliance. |
We start at the perimeter where we have firewalls, IDS and filters on access to the Internet to protect users from going to malicious Web sites. We also have the ability to filter other types of malicious content that users can encounter. |
You have to give users a certain amount of control to do things, so one of the major concerns is how to protect our users from organization risks such as surfing to inappropriate Web sites or clicking on a malicious link in an e-mail that infects their machine. |