Efficiently Isolating Contractors From Sensitive Data: The Many Advantages of Software-based Contractor Isolation


Click here to download now

Source: Apani
Date: March 2008
Type: White Paper
Rating: (3)

Overview: For information security directors at large corporations, the growing reliance on contractors is a major concern. Local and offshore programmers provide businesses a competitive edge, but they also increase security risks. Often contractors are hired to rapidly solve problems while operating outside the security policies of employees. Once within the network, they have free access to confidential data and business systems. Even when access is restricted, these savvy individuals can easily jump to unauthorized systems-unknown to the corporation.

Unlike employees, contractors function outside normal policy controls. The sensitive work performed by many contractors places them within reach of customer data, confidential documents and strategic plans. Whether accidental or malicious, many contractors will find their way to off-limits data and systems.

How can businesses prevent contractors from accessing sensitive or business-critical data? Is there a cost-efficient way to isolate contractors from essential business systems?

To meet these challenges, businesses are turning to software-based contractor isolation solutions. Designed to limit the access of contractors without adding costly and complex firewalls or VLANs, these security solutions are helping large corporations protect their critical assets. This white paper will examine contractor security trends and reveal the many advantages of software-based contractor isolation.

Not what you're looking for? Search again
Go Advanced »

View All Categories

Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Performance Management, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Data Quality

Development : Open Source, Windows/.NET, Web Development, Security, Mobility, Java, High Performance Computing, Embedded Systems, Development Tools, Database, Architecture & Design, C/C++

Government : Cloud/SaaS, Leadership, Information Management, Federal, Mobile & Wireless, State & Local, Enterprise Applications, Security, Policy & Regulation, Enterprise Architecture

Hardware : Virtualization Hardware, Windows Servers, Utility/On-demand Computing, Unix/Linux servers, Supercomputers, Peripherals, Macintosh, Handhelds/PDAs, Grid/Cluster Computing, Desktops/PCs, Data centers, Blades, Processors

Healthcare : Interoperability, Administration systems, Clinical information systems, Electronic medical records, The Patient, Security & Privacy, Leadership, Policy & Regulation, Mobile & Wireless

Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services

Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Web Development, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Internet Policy

Management : Career Development, Training, Small-Medium Business, Salary/Compensation, ROI/TCO, Regulation/Compliance, Recruiting, Personnel Management, Outsourcing, Legal, H-1B, Executive Insights/Interviews, Workplace Trends

Mobility : WLAN, Wireless Security, Wi-Fi/WiMax, Wi-Fi VOIP, Smartphones, 3G Wireless/Broadband, Muni Wireless, Mobile Messaging, Mobile Business, Fixed Mobile Convergence, 802.11x, RFID

Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Virtual worlds, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Global Positioning Systems

Security : Security Administration, End user/Client Security, Encryption, Cyberterror, Attacks/Breaches, Application Security, Antivirus, NAC, Perimeter Security, Privacy, Vulnerabilities and Threats, Storage Security, Intrusion Prevention

Services : Telecom/Voice Services, Business Process Outsourcing, Business Services, Disaster Recovery, Systems Integration, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Hosted Applications

Software : Web Services, Service Oriented Architecture, Server Virtualization, Productivity Applications, Operating Systems, Open Source, Linux, Hosted Software/Applications, ERP, Development Tools, Databases, Database Applications, CRM, Business Systems Management, Integration, Application Optimization

Storage : Data protection, Disaster Recovery, Removable/Portable Storage, Security, Storage Fabrics, Storage Systems, Virtualization

Telecom : VOIP, Unified Communications, Voice services, PBXs, Internet policy, Presence, Collaboration Systems, Business, Regulation, Call Centers

Windows/Microsoft : Applications, Internet Explorer, Microsoft Company News, Security, Open Source, Operating system, Office Suite

Today On TechWeb

Featured Content Business at the Speed of Virtualization
Visit AMD's Business at the Speed of Virtualization Briefing Center, and discover all you need to know about virtualization. Click here for exclusive access to white papers, webcast, videos and more. Read more…

More On Enterprise_Software