Board logo

subject: Asian Network Security In A New Computing Era [print this page]


Organizations that fail to focus on the threats part of their SWOT analysis are eventually doomed ... even with the best product or service in the world. Risk management is an essential corporate activity, and in an IT context risk management equates to Asian network security practices. Today we explore why being proactive rather than reactive about security is not only smart in terms of risk management, but also in terms of budgeting..

We Live In an Insecure World

Globalization and increasingly comprehensive news reporting brings home the fact that we live in an insecure world. The same is true when it comes to data security and business network security. Some statistics that really bring home the extent of the problem in an information technology infrastructure and assets context include:

- The daily volume of spam doubles every year

- 90% of malware is spread through legitimate sites, or by leveraging these sites

- Every 1000 lines of website code contains 15 critical security defects on average

- Most endpoint-based security tools such as signature scanning and URL filtering are reactive, not proactive.

The Elements of Asian Network Security

The elements of Asian network security can be grouped into three main areas. While the inherent Asian data security of some can be addressed by technical means, others require a more creative and comprehensive input of organizational policy. The three categories are:

End-point devices: Some of these will be within the organisation's physical boundaries, some will be without.

The Asian network infrastructure: Including both internal processing equipment and outsourced equipment, data storage solutions etc. The people in control of the technology: This includes employees and suppliers, and in some cases extends to people completely beyond the organization's control.

Proactive Security Practices Save Money

In many aspects of business, a well-executed forward thinking plan actually saves money, while improving outcomes. The same is true when Asian network security and data security experts are engaged in ICT projects from the outset - costs drop.

This truism can be understood in light of the fact that reactive security spending often takes more time, and requires more resources. When the management approach to security reaches the highest level of maturity, and security professionals are involved from the beginning, it costs less to achieve the same level of computing safety.

The Evolution of Business Network Security

Ironically, security in an IT context is evolving to be less focused on the network and end-points - the perimeter and structure - but more focused on the data itself. This concept is allowing a far greater degree of 'proactivity' than has ever been possible in Asian information security. While most of what is done in the name of data security is necessarily re-active, by focusing on data-centric solutions organization can truly move with the times.

by: Gregory Smyth




welcome to loan (http://www.yloan.com/) Powered by Discuz! 5.5.0