Browse Definitions :
Definition

holistic security

Contributor(s): Matthew Haughn

Holistic security is an approach that seeks to integrate all the elements designed to safeguard an organization, considering them as a complex and interconnected system. The ultimate purpose of holistic security is continuous protection across all attack surfaces: the totality of all physical, software, network and human exposure.

Based on systems thinking, holistic security involves consideration of how any security system's constituent parts interrelate and work within the context of larger systems. A holistic approach can be applied to almost anything that requires security be it a person, a computer, a network, a building or a property, but must always be considered within the broader context.

The integration of different levels and types of security enables a more comprehensive understanding of vulnerabilities and more comprehensive protection against a variety of threats.

For security to be considered holistic, a number of requirements must be met. First, separate areas of security must be applied together:  locks, for example, in the physical environment and security software in the virtual environment. Holistic security also demands that systems and devices be compatible and interoperable.

Employees, also an integral part of the system, need to be trained. All employees should be encouraged to provide feedback and suggestions and identify any security holes they detect. Security policies and procedures must be clearly understood by all personnel and those who will be working with the security system should have input to its implementation.  

Holistic security is increasingly crucial in light of the developing Internet of Things (IoT).  IoT security is complicated by the huge numbers of non-computing devices and other objects (things) being outfitted with networking and data transfer capabilities. Because these systems often communicate over the internet and/or interface with other networks, it’s essential that they and their extended environments are secured.

This was last updated in February 2017

Continue Reading About holistic security

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

SearchSecurity

  • time-based one-time password (TOTP)

    A time-based one-time password (TOTP) is a temporary code, generated by an algorithm, for use in authenticating access to ...

  • Security Operations Center (SOC)

    A security operations center (SOC) is a command center facility for a team of IT professionals with expertise in information ...

  • incident response team

    An incident response team is a group of IT professionals in charge of preparing for and reacting to any type of organizational ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • storage class memory (SCM)

    Storage class memory (SCM) is a type of NAND flash that includes a power source to ensure that data won't be lost due to a system...

  • Hadoop as a service (HaaS)

    Hadoop as a service (HaaS), also known as Hadoop in the cloud, is a big data analytics framework that stores and analyzes data in...

  • blockchain storage

    Blockchain storage is a way of saving data in a decentralized network which utilizes the unused hard disk space of users across ...

Close