Identity Management Security Cloud
By Brian Lillie (Part 2 of a 3-part blog series)
In the age of increased mobility and bring-your-own-device (BYOD), many enterprises are struggling with how to maintain the high levels of data security they are accustomed to.
In Part 2 of this three-part blog series, Equinix CIO Brian Lillie discusses the security challenges that have arisen as a result of evolving technologies and a changing workforce.
So now we have to think about how to protect this environment. How did we protect it in the old days? We put firewalls around the enterprise and basically nobody could get in. It was a fortress.
But then we started to cut holes in the wall. First you have a door, and the door was maybe your main gateway and it was more than password protected. You’d give your first born to get through the door.
And then there was VPN, so now you could create a tunnel that’s a little bit wider than the door.
And then, because we’re sharing data, maybe between firms or between applications where one application is outside and one is inside, you start to poke more holes in your firewall. You open ports here, open ports there, and pretty soon you have Swiss cheese.
And now, with cloud, the hole is big enough to drive a Mack truck through.
So the idea of the fortress enterprise is really changing. There’s still a place for firewalls, no question, but we’re now trying to take more precautions in terms of protecting the data. Protect the data first and foremost. Protect the data when it’s at rest inside the enterprise, and protect the data when it’s in transit. So encryption and encrypted tunnels are important.
You might also like
Principles in the workplaceby drenchzgrinch
Hello, I am writing an article on principles in the workplace. Have you ever had to set your principles aside to keep your job? Have you ever lost a job because you stuck by your principles? Has management ever asked (told) you to do something against your principles? Are you in management and had to ask/tell someone to do something unethical? Please e-mail me directly at firstname.lastname@example.org and please keep stories to 1000 words or less. Thank you in advance, also, if you can get your friends/family to tell me their stories as well, it would be appreciated. No ones identity will be revealed and no company/corporation will be named due to libal concerns
Norton Internet Security 2012 - 3 Users [Download] [Old Version]
Digital Software (Symantec)
WSO2 CTO to Present Keynote on Open Standards for Identity Management at .. — Virtual-Strategy Magazine
In his keynote presentation, “Open Standards for Identity: Understanding the Landscape,” Paul will look at identity management best practices and how open standards are evolving to handle the complexities of identity management and assurance.
Continued Rise of the Cloud: Advances and Trends in Cloud Computing (Computer Communications and Networks)
SecureAnywhere Internet Security Business Endpoint Protection - 10 Seats [Download]
Digital Software (Webroot Software Inc.)
[ ACCESS CONTROL SYSTEMS: SECURITY, IDENTITY MANAGEMENT AND TRUST MODELS ] By Benantar, Messaoud ( Author) 2005 [ Hardcover ]
Privacy, Identity, and Cloud Computing