Monday, 15 October 2012

The Latest Security Technologies & Trends



Trends
The Latest Security Technologies & Trends
So, how constantly are developing further threats, security technologies and strategies for their control. New enemies are companies every day (for more information about the biggest security threats of company, see "today's greatest security threats" on page 10); Fortunately, security experts constantly co-operate for enterprises to protect better with a view to security-related problems. Here is an insight at the latest security.

Current landscape

Traditional data loss prevention technology have made much traction in the past year, notes Joe Yeager, product manager at Lancope (www.lancope.com), a network performance and security monitoring company.
Important points

• Data loss prevention technology used increasingly stronger protection for businesses.

• Specific guidelines for the application and device use are on the rise and help address security issues that arise when the line between personal and professional is blurred.

• Companies are a layered now in direction, approach with multiple security centralized inclination points within the network, rather than just around the network.

"Technologies for monitoring data movement with deep packet analysis have become quite good and dormant data technologies looked pretty sophisticated crawling and tagging techniques," he says. These kinds of technologies can show how much data over the network leaves man of man, broken down according to Internet destination based. The analysis provides end to end visibility, that its can to the baseline a normal amount of traffic for a particular user and they be notified when this level is unusual, says Yeager. Also, it is helpful that the analysis according to command and to eliminate botnet infected computers control traffic or find no unexpected country-specific traffic search can.Keep by one flows better as traffic within a company it is Yeager says security and lower data loss can increase risk.

Importance of directives

A major security trend isn't about technology tools at all; Rather, it is the implementation of sound security policies to achieve that in an organization. This has become particularly important in the age of social networking, if the lines between consumer and business applications of the technology are increasingly blurred. For example, an employee could use Facebook, tout a new product or hang on Twitter to update clients. After a current application usage and risk report from Palo Alto networks (www.paloaltonetworks.com) ignore user often associated risks, such as non-conformity, data loss, and threat propagation. These risks can threaten the company network, but IT managers able to block not just response, "Enterprise 2.0 applications" for René Bonvanie, Vice President for worldwide marketing at Palo Alto. To improve productivity and mitigate security threats and compliance breaches, Bonvanie says it should define and enforce policies to enable the social-networking applications. Policy enforcement is also increasingly necessary for the use of mobile devices that adds David Lingenfelter, information security officer at Fiberlink (www.fiberlink.com). Must some level of control over how information processed and accessed, and this led to more specific guidelines about online resources like employees manufacture, how often they change passwords and whether they can download applications. Are also tweaked guidelines is to specify what happens to a device when an employee leaves a company - whether it has recycled after it to factory settings back, such as set. "With policy in place, the basics of treating [these units] is an important component, so that joining the equipment mainly because employees must understand that limits and the limits that follow are kept", says Lingenfelter. "The security plays a very important role that devices connect to the network and security needs with a directive to begin."

Trends

Centralized security

In terms of the further strategy, trends are more companies looking toward layered, centralized security with multiple protection points within a network, instead of simply trying to protect a network parameter. Is due to the increased use of virtualization, cloud and online applications, just around a network with security measures no longer enough. A network must be now something porous for efficiency, which means that companies opportunities to the Implementie

No comments:

Post a Comment