Challenge – Construct, configure and maintain organizational infrastructure, ensuring optimized and secure information systems.
Integrate new endpoints seamlessly into the existing security paradigm
Use automatic GPO and golden image implementation to keep all endpoints at optimal security status
Monitor overall network security, use custom groups to monitor specific logical/network endpoint groups
Produce high-level reports for presentation to executives