Security In The Borderless Enterprise - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IT Leadership // IT Strategy
04:52 PM
Eric  Lundquist
Eric Lundquist
Connect Directly

Security In The Borderless Enterprise

Mobile, cloud, and social technologies have blurred enterprise security borders. Look for a thorough examination of that reality at the RSA conference.

The days of creating an enterprise security border, defining a set of controlled applications, and designing a security system that can assure security, privacy, and compliance within a corporation's confines are gone. Today, it's daunting to simply try to define where a business begins and ends--in an era of mobile workers, huge social networks, and IT infrastructures that mix in-house applications with SaaS options.

In conjunction with the upcoming RSA security conference, I asked a group of CIOs and security analysts for their suggestions on dealing with security in an increasingly wide-open world.

How wide open? As background, consider these recent pieces of security news:

-- Nortel Networks suffered a series of hacks that allowed access to a wide range of corporate email, documents, and other data for nearly a decade.

-- Some security experts advise that companies with employees traveling overseas (especially China) tell travelers to leave the regular laptop and smartphone at home, grab a new system before boarding the plane, and get rid of it after the trip.

-- The computer hacking group Anonymous has evolved from rudimentary hacking skills to a sophistication level that some government officials contend can threaten key infrastructure, including the power grid.

Now, consider some security advice for this new environment.

Fran Rabuck, formerly the director of the real time asset labs at Bentley Systems and director of applied business technology at Towers Perrin, is an independent technology consultant with a focus on mobile applications. "If mobile applications are part of your future plans and rollout, you need to pay even more attention to securing them than you do desktops or laptops," Rabuck stated via email.

Why are mobile applications particularly vulnerable? Rabuck listed four key reasons:

Global CIO
Global CIOs: A Site Just For You
Visit InformationWeek's Global CIO -- our online community and information resource for CIOs operating in the global economy.
1. Desktops aren't lost or misplaced like smartphones.
2. Desktops don't have as many wireless connection options--Wi-Fi, Bluetooth, NFC, GPS.
3. Desktops don't get most of their software from sources outside your organization.
4. Desktops rarely have instant on/access without passwords to the device.

Mobile security threats may be the most visible, but multiple security threats are emerging as corporations become more mobile, social, and cloud-based.

That's one reason that IBM has recently given security a business unit status and turned its analytical systems expertise on the security sector.

Jerry Johnson, CIO of Pacific Northwest National Laboratory and a member of InformationWeek's CIO Advisory Board, provided a compelling summary of the tumult in enterprise security as traditional security borders evaporate.

"(You need to) evolve past protecting the border and protecting the container to protecting the data," Johnson stated via email. "Cybersecurity has evolved (expanded) over the years from protecting the perimeter with firewalls and such, to protecting the container. With data becoming more mobile and hosted outside your perimeter and in someone else's container, we must evolve (expand) to protect the information itself."

Cloud computing brings its own set of security concerns. "These new, Web-based, on-demand services pose a new set of challenges because they can be acquired easily by end users without management approval and encourage a greater information sharing among customers and business partners," stated Jeffrey Kaplan, managing director of THINKstrategies and the founder of the Cloud Computing Showplace, in an email. "While these services often substantially improve employee productivity and customer satisfaction, they also create potential security, privacy, and compliance risks."

Look for cloud, mobile, and social to figure prominently at the RSA conference. Once a very detailed, highly technical gathering, it now also includes a broad examination of the business issues relating to security.

The race between the corporate security attackers and defenders has never been more frantic than now, with the rise of the social, mobile, and cloud-based enterprise. CIOs must embrace the new computing models, while also assuring security, privacy, and compliance in their operations.

Eric Lundquist,
VP and Editorial Analyst, InformationWeek
[email protected]

Security professionals often view compliance as a burden, but it doesn't have to be that way. In this report, we show the security team how to partner with the compliance pros. Download the report here. (Free registration required.)

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

10 Things Your Artificial Intelligence Initiative Needs to Succeed
Lisa Morgan, Freelance Writer,  4/20/2021
Tech Spending Climbs as Digital Business Initiatives Grow
Jessica Davis, Senior Editor, Enterprise Apps,  4/22/2021
Optimizing the CIO and CFO Relationship
Mary E. Shacklett, Technology commentator and President of Transworld Data,  4/13/2021
White Papers
Register for InformationWeek Newsletters
Current Issue
Planning Your Digital Transformation Roadmap
Download this report to learn about the latest technologies and best practices or ensuring a successful transition from outdated business transformation tactics.
Flash Poll