Identity Management Security Cloud // IT Management Solutions

Identity Management Security Cloud

fortress enterprise blog Cloud Enabled Identity Management: Security Challenges

By Brian Lillie (Part 2 of a 3-part blog series)

In the age of increased mobility and bring-your-own-device (BYOD), many enterprises are struggling with how to maintain the high levels of data security they are accustomed to.

In Part 2 of this three-part blog series, Equinix CIO Brian Lillie discusses the security challenges that have arisen as a result of evolving technologies and a changing workforce.

***

So now we have to think about how to protect this environment. How did we protect it in the old days? We put firewalls around the enterprise and basically nobody could get in. It was a fortress.

But then we started to cut holes in the wall. First you have a door, and the door was maybe your main gateway and it was more than password protected. You’d give your first born to get through the door.

And then there was VPN, so now you could create a tunnel that’s a little bit wider than the door.

And then, because we’re sharing data, maybe between firms or between applications where one application is outside and one is inside, you start to poke more holes in your firewall. You open ports here, open ports there, and pretty soon you have Swiss cheese.

And now, with cloud, the hole is big enough to drive a Mack truck through.

So the idea of the fortress enterprise is really changing. There’s still a place for firewalls, no question, but we’re now trying to take more precautions in terms of protecting the data. Protect the data first and foremost. Protect the data when it’s at rest inside the enterprise, and protect the data when it’s in transit. So encryption and encrypted tunnels are important.

You might also like

Principles in the workplace

by drenchzgrinch

Hello, I am writing an article on principles in the workplace. Have you ever had to set your principles aside to keep your job? Have you ever lost a job because you stuck by your principles? Has management ever asked (told) you to do something against your principles? Are you in management and had to ask/tell someone to do something unethical? Please e-mail me directly at drenchzgrinch@yahoo.com and please keep stories to 1000 words or less. Thank you in advance, also, if you can get your friends/family to tell me their stories as well, it would be appreciated. No ones identity will be revealed and no company/corporation will be named due to libal concerns

Symantec Norton Internet Security 2012 - 3 Users [Download] [Old Version]
Digital Software (Symantec)
  • Norton Protection System: Provides industry-leading security with four unique layers of powerful protection proven to proactively stop online threats before they...
  • Insight: Stops new online threats before they can cause you trouble by checking where files came from and how long they have been around.
  • Download Insight 2.0: Protects you from dangerous applications before you install them by telling you if they are harmful or unstable.
  • Norton Safe Web: Proactively protects you while you surf the Web by warning of and blocking unsafe and fake websites right in your search results
  • Norton Management: is cloud based so you can download, install, transfer, update or renew Norton products from anywhere right over the internet.
  • Network mapping and monitoring; antispam; smart firewall
  • Online identity protection; parental controls management
  • Social network protection; browser protection; phishing protection
  • Stops viruses and spyware before they reach your computer
  • Superior protection with fast scan speeds and low impact on PC performance

WSO2 CTO to Present Keynote on Open Standards for Identity Management at ..  — Virtual-Strategy Magazine
In his keynote presentation, “Open Standards for Identity: Understanding the Landscape,” Paul will look at identity management best practices and how open standards are evolving to handle the complexities of identity management and assurance.

Springer Continued Rise of the Cloud: Advances and Trends in Cloud Computing (Computer Communications and Networks)
Book (Springer)
Webroot Software Inc. SecureAnywhere Internet Security Business Endpoint Protection - 10 Seats [Download]
Digital Software (Webroot Software Inc.)
  • Cloud-driven advanced protection against viruses and malware offering full protection against all of todays sophisticated malware threats including Trojans, keyloggers...
  • Built in Identity & Privacy Shield stops data being stolen or captured when using the Internet and the outbound firewall also stops malware stealing data by...
  • No need to worry about or run updates. Cloud-driven security intelligence means your endpoints are always up to date and protected when on or offline
  • Built in automatic remediation means infected endpoints are repaired automatically reducing the need to ever re-image a machine or lose user productivity. Superfast...
  • Simple to use web console lets you manage user endpoints anytime, from any browser and FREE web and telephone Support is included in the price
Springer [ ACCESS CONTROL SYSTEMS: SECURITY, IDENTITY MANAGEMENT AND TRUST MODELS ] By Benantar, Messaoud ( Author) 2005 [ Hardcover ]
Book (Springer)
iUniverse.com Privacy, Identity, and Cloud Computing
Book (iUniverse.com)

Related Posts



Copyright © . All Rights Reserved