Security In The Borderless Enterprise

Mobile, cloud, and social technologies have blurred enterprise security borders. Look for a thorough examination of that reality at the RSA conference.

Eric Lundquist, VP & Editorial Analyst for InformationWeek Business Technology Network

February 24, 2012

2 Min Read

The days of creating an enterprise security border, defining a set of controlled applications, and designing a security system that can assure security, privacy, and compliance within a corporation's confines are gone. Today, it's daunting to simply try to define where a business begins and ends--in an era of mobile workers, huge social networks, and IT infrastructures that mix in-house applications with SaaS options.

In conjunction with the upcoming RSA security conference, I asked a group of CIOs and security analysts for their suggestions on dealing with security in an increasingly wide-open world.

How wide open? As background, consider these recent pieces of security news:

-- Nortel Networks suffered a series of hacks that allowed access to a wide range of corporate email, documents, and other data for nearly a decade.

-- Some security experts advise that companies with employees traveling overseas (especially China) tell travelers to leave the regular laptop and smartphone at home, grab a new system before boarding the plane, and get rid of it after the trip.

-- The computer hacking group Anonymous has evolved from rudimentary hacking skills to a sophistication level that some government officials contend can threaten key infrastructure, including the power grid.

Now, consider some security advice for this new environment.

Fran Rabuck, formerly the director of the real time asset labs at Bentley Systems and director of applied business technology at Towers Perrin, is an independent technology consultant with a focus on mobile applications. "If mobile applications are part of your future plans and rollout, you need to pay even more attention to securing them than you do desktops or laptops," Rabuck stated via email.

Why are mobile applications particularly vulnerable? Rabuck listed four key reasons:

Global CIO Global CIOs: A Site Just For You Visit InformationWeek's Global CIO -- our online community and information resource for CIOs operating in the global economy.

1. Desktops aren't lost or misplaced like smartphones.

About the Author(s)

Eric  Lundquist

VP & Editorial Analyst for InformationWeek Business Technology Network

Eric Lundquist,
VP and Editorial Analyst, InformationWeek
[email protected]

Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.

You May Also Like

More Insights