Security In The Borderless Enterprise - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IT Leadership // IT Strategy
04:52 PM
Eric  Lundquist
Eric Lundquist
Connect Directly

Security In The Borderless Enterprise

Mobile, cloud, and social technologies have blurred enterprise security borders. Look for a thorough examination of that reality at the RSA conference.

The days of creating an enterprise security border, defining a set of controlled applications, and designing a security system that can assure security, privacy, and compliance within a corporation's confines are gone. Today, it's daunting to simply try to define where a business begins and ends--in an era of mobile workers, huge social networks, and IT infrastructures that mix in-house applications with SaaS options.

In conjunction with the upcoming RSA security conference, I asked a group of CIOs and security analysts for their suggestions on dealing with security in an increasingly wide-open world.

How wide open? As background, consider these recent pieces of security news:

-- Nortel Networks suffered a series of hacks that allowed access to a wide range of corporate email, documents, and other data for nearly a decade.

-- Some security experts advise that companies with employees traveling overseas (especially China) tell travelers to leave the regular laptop and smartphone at home, grab a new system before boarding the plane, and get rid of it after the trip.

-- The computer hacking group Anonymous has evolved from rudimentary hacking skills to a sophistication level that some government officials contend can threaten key infrastructure, including the power grid.

Now, consider some security advice for this new environment.

Fran Rabuck, formerly the director of the real time asset labs at Bentley Systems and director of applied business technology at Towers Perrin, is an independent technology consultant with a focus on mobile applications. "If mobile applications are part of your future plans and rollout, you need to pay even more attention to securing them than you do desktops or laptops," Rabuck stated via email.

Why are mobile applications particularly vulnerable? Rabuck listed four key reasons:

Global CIO
Global CIOs: A Site Just For You
Visit InformationWeek's Global CIO -- our online community and information resource for CIOs operating in the global economy.
1. Desktops aren't lost or misplaced like smartphones.
2. Desktops don't have as many wireless connection options--Wi-Fi, Bluetooth, NFC, GPS.
3. Desktops don't get most of their software from sources outside your organization.
4. Desktops rarely have instant on/access without passwords to the device.

Mobile security threats may be the most visible, but multiple security threats are emerging as corporations become more mobile, social, and cloud-based.

That's one reason that IBM has recently given security a business unit status and turned its analytical systems expertise on the security sector.

Jerry Johnson, CIO of Pacific Northwest National Laboratory and a member of InformationWeek's CIO Advisory Board, provided a compelling summary of the tumult in enterprise security as traditional security borders evaporate.

"(You need to) evolve past protecting the border and protecting the container to protecting the data," Johnson stated via email. "Cybersecurity has evolved (expanded) over the years from protecting the perimeter with firewalls and such, to protecting the container. With data becoming more mobile and hosted outside your perimeter and in someone else's container, we must evolve (expand) to protect the information itself."

Cloud computing brings its own set of security concerns. "These new, Web-based, on-demand services pose a new set of challenges because they can be acquired easily by end users without management approval and encourage a greater information sharing among customers and business partners," stated Jeffrey Kaplan, managing director of THINKstrategies and the founder of the Cloud Computing Showplace, in an email. "While these services often substantially improve employee productivity and customer satisfaction, they also create potential security, privacy, and compliance risks."

Look for cloud, mobile, and social to figure prominently at the RSA conference. Once a very detailed, highly technical gathering, it now also includes a broad examination of the business issues relating to security.

The race between the corporate security attackers and defenders has never been more frantic than now, with the rise of the social, mobile, and cloud-based enterprise. CIOs must embrace the new computing models, while also assuring security, privacy, and compliance in their operations.

Eric Lundquist,
VP and Editorial Analyst, InformationWeek
[email protected]

Security professionals often view compliance as a burden, but it doesn't have to be that way. In this report, we show the security team how to partner with the compliance pros. Download the report here. (Free registration required.)

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
3/1/2012 | 7:05:57 AM
re: Security In The Borderless Enterprise
Cloud services are really good and powerfull among it field of security areas.
Augmented Analytics Drives Next Wave of AI, Machine Learning, BI
Jessica Davis, Senior Editor, Enterprise Apps,  3/19/2020
How Startup Innovation Can Help Enterprises Face COVID-19
Joao-Pierre S. Ruth, Senior Writer,  3/24/2020
Enterprise Guide to Robotic Process Automation
Cathleen Gagne, Managing Editor, InformationWeek,  3/23/2020
White Papers
Register for InformationWeek Newsletters
Current Issue
IT Careers: Tech Drives Constant Change
Advances in information technology and management concepts mean that IT professionals must update their skill sets, even their career goals on an almost yearly basis. In this IT Trend Report, experts share advice on how IT pros can keep up with this every-changing job market. Read it today!
Flash Poll