We use cookies and other similar technologies (Cookies) to enhance your experience and to provide you with relevant content and ads. By using our website, you are agreeing to the use of Cookies. You can change your settings at any time. Cookie Policy.

Recently a client of ours asked me “what can I do to make sure I can never be attacked?” The only answer I could think of giving him was “I think that’s a lot like asking me what we can do to make sure we live forever.”



IT folks have come to grips with the realities of security. If someone can build it, someone else can break it. If someone can come up with a network hardening device, someone can counter with a way to soften it. The more clever the device, the more clever the response. A decade and a half after the Internet revolution, as the adage goes, the only safe computer is one that’s not connected to anything. I sometimes wonder if that’s even safe.

This is not to say that we have not risen to the occasion and protected ourselves adequately. It’s an uphill battle, and one that will remain for some time to come. But in the words of an old professor of mine, "don't let perfect get in the way of good".

So where does this leave us? Where do we stand? What are our biggest threats?

The Return of Physical Security Concerns

After years of development of firewalls, anti-virus software, proxy servers, isolation servers, SSL, automatic updates, network monitoring tools, secured email and a host of other security devices we are back where we started from - worrying about tapes, door locks, camera's, location of servers and all the peripheral devices to the actual network (i.e., air conditioning).

“Physical Security is one of the biggest threats, and is an area that is being revisited and will continue to be looked at in the coming period,” says Michael Curry, Director of Operations of Richard Fleischman and Associates, an infrastructure and integration firm in NYC. According to Curry, in a recent event, a fund administrator had their backup tapes stolen en route to their backup facility. The point becomes very clear here– tape media leaving the physical site can be dangerous. RFA, which specializes in financial firms, has been offering options besides tape media. “Not only is the threat of tapes being stolen an issue, but the failure rate of a restore can be as high as 30%.” Curry’s options include using one of the many on-line firms that will accept the data in an encrypted format over a secure VPN. This way, tapes never leave the physical location. When setting up a firm’s network, physical security has become a standard part of the checklist - on par with firewalls, servers and T1 lines.

-1-

1  2  

   Next Page

Explore Our Topics

  • EDITOR'S BRIEFING
  • Virtual Conferences
  • Webinars
  • Roundtables

BPM in Action

March 10, 2011

The sixth annual BPM in Action 2011 Virtual Conference will explore cutting-edge market developments in BPM and describe how to leverage them for improved business operation and performance. More

View All Virtual Conferences

Smart Case Management: Why It's So Smart.

Date:Nov 05, 2009
Time:12:00 PM ET- (17:00 GMT)

REGISTER TODAY!

Date:Oct 29, 2009
Time:15:00 PM ET- (19:00 GMT)

REGISTER TODAY!
View All Roundtables
  • Research Library
  • Podcasts
  • News

Joe McKendrick: Part II of II: Designing Evolve-ability into SOA and IT Systems

In part two of Joe McKendrick's recent podcast with Miko Matsumura, chief strategist for Software AG, they talk about how SOA and IT systems need to change and grow and adapt with the organization around it.

Listen Now

Phil Wainewright: Helping Brands Engage with Social Media

Phil Wainewright interviews David Vap, VP of products at RightNow Technologies, and finds out how sharing best practices can help businesses understand how best to engage with online communities.

Listen Now

Peter Schooff: Making Every IT Dollar Result in a Desired Business Outcome: Scott Hebner of IBM Rati

Scott Hebner, Vice President of Marketing and Strategy for IBM Rational, discusses a topic on the top of every company's mind today: getting the most from IT investments.

Listen Now

Jessica Ann Mola: Where Will BI Fit In? Lyndsay Wise Explains

In BI, this tough economy and the increasing role of Web 2.0 and MDM are certainly topics on people's minds today. WiseAnalytics' Lyndsay Wise addresses each of them in this informative podcast.

Listen Now

Dennis Byron: Talking with...Deepak Singh of BPM Provider Adeptia

Deepak Singh, President and CTO of Adeptia, joins ebizQ's Dennis Byron in a podcast that gets its hand around the trend of industry-specific BPM.

Listen Now
More Podcasts
  • Most Popular
  • Quick Guide
  • Most Discussed

Quick Guide: What is BPM?

Learn More

Quick Guide: What is Event Processing?

Smart event processing can help your company run smarter and faster. This comprehensive guide helps you research the basics of complex event processing (CEP) and learn how to get started on the right foot with your CEP project using EDA, RFID, SOA, SCADA and other relevant technologies. Learn More

Quick Guide: What is Enterprise 2.0?

A lot of people are talking about Enterprise 2.0 as being the business application of Web 2.0 technology. However, there's still some debate on exactly what this technology entails, how it applies to today's business models, and which components bring true value. Some use the term Enterprise 2.0 exclusively to describe the use of social networking technologies in the enterprise, while others use it to describe a web economy platform, or the technological framework behind such a platform. Still others say that Enterprise 2.0 is all of these things. Learn More