Protection by Design: The Importance of Architectural Artifacts in AV Security
Let me set the scene. Two companies are rolling out their new AV systems. Company A has meticulously prepared network diagrams, security documentation, and architecture reviews. Company B, on the other hand, chose to make things up as they went along. Guess which company is scrambling to fix security breaches, and which one isn’t?