Decision Point for Host System Security Choices


Analyst(s): |

Not a Gartner Client?

Want more research like this?
Learn the benefits of becoming a Gartner client.

contact us online


Organizations have choices for the management and security postures of various computer systems such as fixed desktops, mobile clients and servers. This Decision Point examines alternative security and management postures to mitigate risk and the criteria for selecting the most appropriate protections for particular system roles.

Table of Contents

  • Decision Point
  • Decision Context
    • Architectural Context
    • Related Decisions
  • Evaluation Criteria
    • Requirements and Constraints
      • Maintain Security Objectives for Data and Applications
      • Protect Systems Owned and Managed by the Organization
      • Establish Minimal Controls for Unmanaged Systems
      • Support Location-Based Policies and Controls
    • Principles
  • Alternatives
    • Prevention
      • Managing Standard Operating Systems
      • Using Specially Hardened Operating Systems
      • Third-Party Security Add-Ons
      • Infrastructure Protections as Compensating Controls
    • Detection, Logging and Monitoring
    • Reaction
      • Location
      • Automated vs. Manual Reaction
      • Reaction Processes
    • Management
    • Controls by Management Style
      • Unmanaged Systems
      • Moderately Managed Systems
      • Heavily Managed Systems
      • Managed Containers
    • Host Access Control
  • Future Developments
  • Decision Tool
    • Prevention and Management Position
      • Client Computer Management and Prevention Position
      • Server Computer Management and Prevention Position
    • Detection Position
      • Use Detection Mechanisms on the System
      • Use Network Detection Mechanisms If Available
    • Reaction Position
      • Maintain an Incident-Response Capability
      • Location of Reaction Position
      • Reaction Process Position
  • Recommended Reading
© 2012 Gartner, Inc. and/or its Affiliates. All Rights Reserved. Reproduction and distribution of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartners research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice.

Free Research

Discover what 12,000 CIOs and Senior IT leaders already know.

Free Access





Why Gartner

Gartner delivers the technology-related insight you need to make the right decisions, every day.

Find out more