Creating a high-security, high-performance e-business infrastructure demands close coordination of both technical and management policies and procedures. This chapter discusses how e-business security is evolving from an old notion of an information fortress that keeps others out, to a new notion of privacy and trust as you give customers, partners, and remote employees access to your business data.