Applications that you run on your enterprise servers perform important business functions and may process sensitive information. Any unauthorized access, whether malicious or not, to such information or to configuration interfaces may have serious and potentially disastrous business implications.