|
IT SECURITY
The
information age presents enterprises with
a challenging security landscape as they
seek to operate on a global scale, build
IT capabilities to remain competitive, and
fully leverage new business models. Security
planners must adapt to ongoing “de-perimeterization”
of the network, expanding compliance mandates,
new malware exploits and an influx of career
criminals into the online environment. Planners
must also secure and enable loosely coupled
application models; new collaboration tools;
and real time communications media which
promise to create an even more complex and
distributed environment.
Hardened computer security systems, strengthened
user authentication, and sustained user
awareness programs are examples of necessary
and “across-the-board” approaches
which can be effective. Enterprises must
create additional layers of defense that
extend policy enforcement throughout network
access points down to the individual hosts
on the edge of the network. Policy enforcement
must also protect critical applications
and data, and the integrity of security
infrastructure components for identity management,
patch management, content control, and other
components. Fundamentally, IT security organizations
must develop a security management control
system that cuts through today’s product
category confusion and console chaos to
provide holistic and measurable detection,
remediation, audit, and policy management,
and other capabilities. Conference speakers
will clear up muddled market terminology,
outline architecture alternatives; explain
how the products fit together and what vendors
need to do to take functionality to the
next level. Attendees will also benefit
from hearing about lessons learned during
a variety of real-life customer implementations.
|