This paper is a detailed discussion of best practices and the software applications available to manage, protect, and control infrastructure operational IT assets. Download this paper to get 3 ready-to-use samples of implementation matrices including specific software recommendations for points such as: application administration, device monitoring, traffic monitoring, policy enforcement, malware repulsion, audit & compliance, backup & restore, hosts and appliances, and traffic forensics.