Survey: Digital transformation can reveal network weaknesses
When enterprises embraced digital transformation, some found their existing networks had a limited ability to address cloud connectivity or access for mobile users.
When enterprises embraced digital transformation, some found their existing networks had a limited ability to address cloud connectivity or access for mobile users.
Security models are evolving, cloud is changing the game, the desktop and mobile worlds are converging, and new regulations are emerging
Reducing the surface that needs to be protected to a single application, it's easier to apply very tight controls through Software Defined Perimeter techniques.
This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe.
This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe.
"Lions, and tigers and bears! Oh, my!" Anyone who has ever seen The Wizard of Oz knows that's the sum of the fears of Dorothy, Scarecrow and Tin Woodsman as they head into the woods on their way to Oz. For the network security administrator dealing with unmanaged devices, that refrain might be something like "handhelds, and laptops and guests! Oh, my!"
About fifteen years ago, my husband and his colleague had their laptop computers stolen out of a car. They were fearful of reporting the incident to their boss, largely because the laptops had cost the company about US$7,000 each. A $14,000 hit to the departmental budget was a serious blow. And back in those days, no one gave much thought to exposure of the data on the stolen devices.
Sometimes, the problems we experience with computers are a result of a legacy design. Hardware or software might have been architected 10 or 20 years ago when the world of computing was vastly different from the way it is today. As a result, the product in use today isn't as effective as it could be because of aging or obsolete design.
In recent years, organizations that have experienced breaches have been forced by law (in many cases) to report the occurrence. Therefore, we've seen a spike in incident reports. Collectively we can all learn from those reports to attempt to prevent similar occurrences in our own organizations.
With the crackdown on certification cheaters, the ITCC strongly urges candidates to know and follow the certifying agencies' security policies. They are posted online and must be acknowledged when a candidate wants to take a test.
The integrity of IT certification is vitally important to everyone. IT, as an industry and a profession, is largely unregulated. There are no government standards that define the qualifications of any level of IT professional. There is no licensing process or required educational background. In essence, anyone can declare himself a "network engineer" or a "systems analyst." It's the Wild West of professions.
A member of the Exam Security Team from a major IT solutions vendor recently received an e-mail from an IT professional who owned up to the fact that he had inadvertently cheated to prepare for his certification exam.
For the first time ever, companies that develop and administer IT certification exams are working together to combat a problem that has largely been swept under the rug for years: certification fraud.
Symantec seems to be one of those companies that toiled for 25 years to become an overnight success. The company has grown rapidly through mergers and acquisitions, not the least of which was systems management company Altiris in April 2007. Now in 2008, Symantec is a powerhouse player in security, systems management, application virtualization, storage management and compliance.
You might think that all laser or inkjet printers are pretty much the same, and basically, they are. Manufacturers such as Canon, HP and Lexmark don’t make a lot of money on each printer they sell. The big bucks come from selling you supplies such as ink cartridges over the life of a printer.