Watch this video on YouTube
What would a security manager primarily utilize when proposing the implementation of a security solution?