sponsored by ComputerWeekly.com
Posted:  25 Oct 2011
Published:  10 Nov 2010
Format:  PDF
Length:  6  Page(s)
Type:  White Paper
Language:  English

In earlier times, if an enterprise presumed it had control over its network, and if it had few external connections or communication, it was feasible that the connections between operational computers probably were not an unacceptable risk. This required that any visitors to the enterprise with electronic devices had no ability to access the network, all users were properly managed, and that they abided by enterprise rules with regard to information management and security.  This is now a rare situation. Most enterprises use computers that are connect to the Internet, employing wireless communications internally, with the majority of their users connecting to services outside the enterprise perimeter, and partners and collaborators regularly connecting to the enterprise’s internal network with their own computing devices.  Additionally there is the emergence of Targeting Trojans and Worms that rely on our use of this old “Internal Trust” architecture to propagate.  In the de-perimeterised world, the use of inherently secure communications1 is essential (JFC#42) to provide protection from the insecure data transport environment. Inherently secure communications products, services, and protocols should act as fundamental building blocks for secure distributed systems, adaptable to the needs of applications while adhering to requirements for security, compliance and performance

Risk Assessment | Risk Management | Security

View All Resources sponsored by ComputerWeekly.com

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement